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"}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000007100)={{r1}, r7, 0x6, @inherit={0x88, &(0x7f0000000480)=ANY=[@ANYBLOB="01000000000000000800000000000000c200000000000000001000000000000020000000000000000000008000000000040000000000000003000000000000000100000000000000040000000000000000080000000000000700000000000000050000f6525441de2e3d04000000000000020000000000000800000000000000ffff00000000da61d521d90000"]}, @name="33928ea33ab3a6fad29403b345d255ed6feda8fb03cb2c28b55277d6bc9ca1cc40f68d2bad63704805546c66c6a7ea61f3fe11ad0afd0f141b3c5577445bb3a6d1106cb5b7b1403feece68c7eb9d9e3fa94c62c78ff2b0618bde277cd2c038ae35b32e539ba9f1d0028cefa0da79433c4748247fcbad2180982769a2d017ec24533df34e01ea36c55c9efda7025698e2db002c16fbbba896593cb8d5e8b445d89dfa7acbb7cded3b22605acf21d532de03c23a919ccd706753ccef3541ecc26624f6b13748a15b07f995518ada9c5f3ada4f9d980e7f6d4036ae8d16e18fe2f94fe3a576fae7a4d1e9f025987b273e86903ebc62fd477df8d18f25c4b7c527276eb0fc069f3fb5e6331ff14c66fbf9fe63f6b7d8bb0792bebbc59430772d90118f783d69d170443a811e10c1bf2296104dc12315b8dd9394582070c6639b0d2895d4d0b80e24dc489b30f2be2863ff2fd88de234db9be19cd54b0b27cbc3ae97624da08ed25f175c36276d82e65a181301afe2fcb2a02d709293bb4cdea8e30b564488421ba569512a6cef55e5f061d9b19439b4595e583c8bcbbf60d9b6da6978e5164c23f6f2753c01b298dfadbcd987bddb387d8e304eb865be517a35b1bf54d362771eecb3a0ed79159cfae797dec3e7976406b06afb2545ab42a3f487052637f7a8befd1306c2afa12f1c0537128706ee99a892126fbc6a0a36ebcd622c58bd4b0362a3c9923d7ebd0f977eb0655204d9d50e168373cc706246e59abb7fb098e9c124cdf26876d8dde930f3f9be749bd4fbc5139bdbb908baf890d2109f739cad1a668a66886889b74f629f66f7494a25be5a77ab2277ab7bbd822b0633c266311de88296b431d9ff51f921b01e850b49a459fe88cdaeaefe2a1e8727590a8eda8f6022e832c4fffa81f3c909d60968f192402ab9858e80e433b1989732ea1d49f1659a9e470af493aafe78f583b6daada63ed3587e53637e8559175bf28cb51076e16f5e32dba70598cbbe72f90879522d243f6c4bc8571be6b3e60cea1cb735984f3d75c69a23edad983cd76206524ef36467936d437a848ae362ded50c02d2a66696cd35cf16392c0c1dac65ee924fe7d1d30b1c5e2cb3fffc5ae4d55c043b22766a1e7d091efa3ce345d495ce4d30f840910d281704eebe7913ed49a21911cfe26ae484ccdfa1361fce59a0de2fffab62e48337188e4d6e148ac7d5a74551c5fd0f5dde4168f8e2b87b296a2a793fec247a405179c509767f8a323f96c2751a159e380aebbe70bd4cb498741b2ea4936df3b6415235c55d1d01f19fabda2000b71d7355b5803e0d96b1c86fc0cc51248d47367393161c5e6dac0f57d157687f0556308ea5c1e664e0722b5da26eb1c3170edff1c696f3e340aec9c93d90bb6dd38e9197b8b7ad00d615c0bd7e566b8ff6a77a01915983c76473a54f481d9e71e956dccf6ff5136337a03b6592e73a4f3497e5859a8d68b462bddd0139500a6dd48473f89674c8ade79339a8bcf36842d2e16643c3b4609d306b4afbccc6f5eff55398cfd7b8340bc3b025754f91b2ba61f5d9a0efd7168d0482fab15e2933614e2b76c0b6d59de5edc4f019d9801b60db81832a4ea4afde7c73fad902143b63b916e3b72957ae3a6a7849a7db6abe3a2db07af213a6b700905c530b10c8480b1ed47c1fca0a8428fd84f83be9d0987b77623fea01313dc1399de58bd6f1ea39a623fb674d9368167f1eca94631afbc27e8e23de3da4eb04ec07cb35ec7cfe12e50041a4f0c118e7ad4a85d2312e22fb988c131f179deb5e996e47aadac847d12994ef84f62404823f59f65c2af6c3dd4541d43033ed7b6c7b9393c71aa35e1cbf93c9c02d9f263372d5b7e57a8b7e2fad40d03b4fb15a7c94f37d5560f28cb78048a70067b062f9da08ce514d1ab95a5689c0db4a5b42186ea1863277213719502f2aa9b7290322aab1e8e944ad1004345948d5ed6ad59a3fd19a4c1e15a292cbf9ff8c4848e093235109c927330c7bf4c73ffabc1815274d57c2ebc1ec3aa1a5123546d1b5ddd7cee9fd313a0f73aaf0a10b94ad187999b2c459a0813b95968bd5408153f913f63d63080f0415de0fb4e775752d5709e7a0b25d6057d8351160b6980f9cad6138b8847be66390106b059b4194dab51e35e99ee930ac522fda180be2c9a056aa821062dd07772cedd5196008839b1283712e4fb1c8b39376c93375d07af219515bdea6f03536cc66762b9e849056218367e23b9ef47535f951bd3ed888f2fcb2319155b0fbabcc81835ffa49395aea77c66c7f57166eec8ca2b033582fd15dbf7ab8a9071919b2716cb035b5c53620dd66e087b221394e1ae588a751de49b518bc2d787a564086587573313dc241a8e611fe6e4cd58f1c2302cf8d9616b3f024d9d872cc117c74a79c967eb2241de842e159c99a5b5b6d71c1d66762c26a4bfd665ea2dd33209d9b71180eff8e2502d79069373d0a2340789826979e9eccdc917460e95939cb161363c1daa8abb654adf2940c8f8cafac9c2e4082ba0c9e5fde1cb9e2dad30145cea63c57f5e3fadd18e320f5edb4f9616594f815c756160328028ff8e414e3af56f45757530d1edd1e3d62aadcdcb234de4b766c4375516e0930b1670ecf23983191ded05eef25de5b4ba0d8008bc4f39daa184f7f3f5d5e6db72062dc820d32c9d1e485648c1d4cca3b0d4c7121bc78ce30007af5e3645d544f3b976d2cacb87dc72559e3a190a431acb0aacdda48cc3ed8bd1b32a473a3a1c019ccc09af04876798b9069e172f608927b5fa44433b48df7cbc1276a4e210aec9241b2de086c71a61a1f3c4f2c3fe53d38f8effc48c330666a179b48d70696fae27201643e30bb6d5f65925ab7e204dfcb22d51a2605b7b875f6217a60932b7cdb913eca9b22578dd04b16682418f891e012825b0f96dc597b7dd948dc0ed355472804f2c9d871197b6e8af5ad1feac8b5ed593ced18c0b7abef67f0ba8015d7c2de91406dc2a0e4e7b7001e2b70a4f3cf9b97bb225272499cc199fe46d0606bae7de077b7b1c8b70a21d21a52e1cf9b07d12b8f1684fbfd47b4ff56a66ea8a9e2fe81a7ee23eef9cf840a4c04e7c4368bd98be361a60a3a06fee1d69e42d6c20260a679a6c9509ed207548c8feb6a0e4071e32e867deb27ade4c03b3e3270c13c8278bef6a4213d2c81865e8b2b87ea744462ec2d2351fa4e6cfd860544fc12b6b24e2f82a139a498a8dadcf0bd1894692e48908161328bfbf67b464adbbbdd529833528ecda24e37281b3e62a275844576ec9a370de42ef4320e80b3227f5633be45a3f9ab08f5687b0bfe4bb49f3d8d84332832427097b11a0d57d13f944bb20f262452007c8192549b1e446872aae4526a40ed0af0e066a2c39f7d098c5dd5a96f9901f0f8afa192a494dc5eb480609c32dad91d45c1ccd277e81e7ae45f94ebe60e3e6c7853559ac11d34c5ac0a53beda33dccc6f656513fa5bbb0e18769d99a9af7b9238e90b65ed07b4f98e769b02ec6a6c447469ed5146b2eafca28a711cf4f1614f4ecfac1270dd87096d7e0dada43537c4d521b72264ebbbdf7bc282e2710fa4abea7753310d8e2b37f1acbd848d97fcc179f6bfca4c4d80927e316129c839d9f8dbbd1c64d8ed3c536d373cf7dc67061cc46e105f93695f6d8f08c6f855f506a9b3fe4d31823ac09960b74e23ba8e672912720c04c3e304e1ae81b08ee87158eeb0d0fc4474c439d51f5f6d88294c2a09b9f278b3cefbb270e54e3c231c06634497c12c7c0ae8b8759a6d7057057e2fdd4a742c7ada81a3afb3fba9658efcb24b37c02f56c825080943994cee27d327ff232443bc8b7c9d499c6ee9e5ff48f67cb1571c663125cb5f01e7113555cb02eedcd5aaa56434d815653df47c7aa41c35fb7f8abf6c9893ba98a95b9cab0a755d4c9683ab68174c2fb24f7c8e55925826bda4a6c16f69d38015069c0dc5d2b6afe5f1753507abd101faf30d64fd33614c5f4cfd1357db38eaa0bea345584eb6c51f88a1dc9f1620ad14aab9b4b6d30c2759f1ef96be1e94e757044d28e4821857a3016b4ab7877fbcac166a9d523d30a0cdaa1be7e0b4a01d7617aff81f6ad28a7aabc7778bbfa0f5b371f8a1dab819cc58f11a93f1319e27f52bc429bd531347728bf33afdbe0a37cbce2cb6fbfe2938d2b3f03879253542ed4080dc8dc13e23e2e8da3cad9a659c54f6a8731279d4a381b678dedad0e510f481c05426ec52e65d17f9e005ae2f58bcd79181ce56bcfb9d7d674f3a40928c96c6d9265654c161f6c75202a88a13771a2c9542aaea77eeb0a13045c99cdcf83a060e57c2315fc88b23b7a01d2a77ebf6b3a045bd4165ee98f156633dbca55f7795f6f9cf6a77d6b54c9e44c642d8db7512da9736b99d0594cc9a12b927208d2c21575ee9ed97e149111453817afd10a9dae7be38892e03cff73278d9e2be70696a9af7344efea9968d75673561471e4fd7417832f862ae48960f9f65c8120e2cef68d508e1d5de3b6850adfd519e2e30bb231a1ec3fdc746c0bd7674be586bee1af1e64562273baadfb7b31b7e07e4c49dce694de5b0eef3de2d4f01e77084fcc17ed2bf3d838d95f96947da8c40ca5e30a4dd5a8931eaa8899404c9bd24cac62d2e96fffe34076fcaf841d0ddf046883f2b6822089ff822261e1b27b1945611661abc15d2ea9b12f45ebcc267e6796723eb0d9fb8ae101fa889e9c6e98979d308e9f611bf2f41c34396bb9715d20a9d6c11709deb9f7355400c0bdd59fc7085d1ae86a2ab16ea9b187803290557d2dda8b0adf142145585efd383bc55fa131745e7ac91ee3813f4442c3a24aae4b86476ce982b959b5ef694a0cc436e4ce8ddf21c99c7e9bd8237e972afb6867527b8e6a41ea814092ecf2aff0ecc9138f6337de4079d371ba0c8b10b75fef47a048159b744247502f5e6c5c79867bb9b7efc7496eed320702a99bb56b80fa1dc23f5f562588bd90adc7eb08d5b7979b435f6225961306ed1a4769bc392c2d4f5f098f2e32a94283607ba5f0271670620dd87081cb929612b81e1fd63ccb58c4de84dbad92d36ea766b518ad3398da777dbfa287811faf29f0b2818898f98f54245506489b74ccdbacdbf2a92d1fb2aa168d0769268c45f4d963aa842b496f0d1169d1b1359711999c78ccc5d41a006fe92d8ecff72de500aa0783d90f0ad3440f0c6b88ba5eef6ddd0054ba76af7c9095c4e5a709e02a36b51aa95d8670e1b49c1fab88a535265ee524ed2fc2cd6d613a1490f448e0c40f55240e47e8188c9a2e1d01a3b1c90cb3aea98fb2ae458bd64e46e1b51eb92231f99825b2dfcf9aedaea553decc9e636cfb8c0a95abc8022af08125eca6b3a60b74544cf5e8aac17a7e4f1193c78252d361864331238501a3fe40a8ad8288cbc64e1e772131df06feae47b56726a9fda4f1f5f0f4d64b325104aa9cb8c996bba780b65bad2aec6cd72d50b9e05d29b2bdc4795bd1c524dbcbf08737ffa88b681d52a97b86c62aeec712aa8fcdeb47064576fbc59c46a662a47e37db7d7292b5bb4abbcea8920a9877f65b6c4fa9f2a8d612949022756da36ae13f9afae9c641d38a0139c063f7fc9d4a7c860cb0e8aa116c191b7a0b5c00b8ccf93a83f2cfe694f8a6ac6d526322ea8f14af9bd35d021957b4113673ad683ddb927b8c6cc0bc9df2e2ec5354f8e3c"}) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:08 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfe80, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:08 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:08 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x500, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:08 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xff00, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:08 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 271.317378][ T9425] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 271.335859][ T9425] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 271.353041][ T9425] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:09 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x76, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x20}, r1, 0x7, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:09 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0xffffffff, 0x0, {0x2, 0x0, 0x10, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:09 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x600, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:09 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x100000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:09 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:09 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:09 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xa00, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:09 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf0ff7f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:09 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xf00, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:09 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet6(r3, &(0x7f0000000000)=[{{0x0, 0xffffffffffffffec, 0x0}}], 0x40002e6, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x40) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 272.188142][ T9469] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 272.197938][ T9469] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 272.207358][ T9469] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:10 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x1000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:10 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) sendfile(r1, r2, &(0x7f00000001c0)=0x8, 0x1) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @empty, 0x0, 0x1, [@loopback]}, 0x14) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) splice(r3, &(0x7f0000000080)=0x1, r4, &(0x7f0000000140)=0x1, 0x9, 0x8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:10 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x1100, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:10 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x76, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x20}, r1, 0x7, 0xffffffffffffffff, 0x0) getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:10 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:10 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:10 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x2000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:10 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x1400, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:10 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x3000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2600000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:10 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:10 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x3000, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 273.043402][ T9504] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 273.060617][ T9504] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 273.075186][ T9504] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:11 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x4000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:11 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:11 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x76, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x20}, r1, 0x7, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e05000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:11 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000001800ec000000000000000000020000000000fe080000000008000700ac0214bb1909fc83a712c0dfc23730c806bf2d8aa4a8c3b30e22b258c22747cbc1ee2e7c5c0aa6d0d5d050fac50e7a048d0a5a6f6129c8617376caf75ebb841557d75bc395f496859f49"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) io_setup(0x400, &(0x7f0000000040)=0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) io_submit(r3, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x4, r4, &(0x7f0000000080)="a57faa519d113e792e77891b43ef", 0xe, 0x9, 0x0, 0x1}]) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:11 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x4000, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:11 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x5000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:11 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:11 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x6000, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:11 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x6000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:11 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:11 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xe000, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 273.918110][ T9545] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 273.930134][ T9545] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 273.947178][ T9545] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:12 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:12 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x7000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:12 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xe803, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) r3 = socket$inet(0x2, 0x5, 0x401) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r4, &(0x7f00000000c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev={0xac, 0x14, 0x14, 0x1c}, @in=@multicast1, 0x4e21, 0x8000, 0x4e22, 0xf000, 0x2, 0x80, 0x80, 0x5c, r5, r6}, {0x401, 0x0, 0x4, 0x1b3, 0x3, 0x4, 0x1, 0x8}, {0x8001, 0x8, 0x400, 0x1ff}, 0x401, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0x33}, 0x8, @in6=@empty, 0x0, 0x0, 0x1, 0x1, 0xfffffe01, 0x442, 0x400}}, 0xe8) 03:00:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8004000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x8000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x9000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:12 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xf401, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xa000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 274.802098][ T9589] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 274.810113][ T9589] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 274.821894][ T9589] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:12 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:12 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) r3 = open_tree(r1, &(0x7f00000001c0)='./file0\x00', 0x8000) write$binfmt_misc(r3, &(0x7f0000000240)={'syz1', "e3d03396f674d128a66ee2c1380b997c4f42223533c3712dd0a325d72ea5eee6052f19244f6d58136959d69c11bbbeba23f31bd796ebe8a3c6e814825f0e883f7960a2cda3e93af410ad807f6502089de8f66cbe974f3186fe467af75163663bcc38aaef615bdbdc76b9d42fd9b4ba169ee8b0b24d1696678192e088c711744ac82b65e6cf36160c6409823e"}, 0x90) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e21, @loopback}, 0x10) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:12 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x600, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf0ffffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:12 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x10000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:12 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:12 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:12 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100), 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:12 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x1100, 0xffffff7f}, 0x14}}, 0x0) [ 275.689649][ T9632] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 275.697474][ T9632] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 275.713427][ T9632] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:13 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:13 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:13 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) splice(r1, &(0x7f0000000040)=0x3, r3, &(0x7f0000000080)=0x8, 0xffffffff, 0x1a) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:13 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2100, 0xffffff7f}, 0x14}}, 0x0) 03:00:13 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x10000120, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:13 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x11000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:13 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:13 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2900, 0xffffff7f}, 0x14}}, 0x0) 03:00:13 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 276.483542][ T9650] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 276.512183][ T9650] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:13 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x20010010, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 276.539247][ T9650] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:13 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:13 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2b00, 0xffffff7f}, 0x14}}, 0x0) 03:00:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff03000000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 276.650555][ T9679] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 276.658997][ T9679] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 276.675341][ T9679] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:14 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x20020000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff1f0000000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:14 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2c00, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(0x0, &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:14 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x3f000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:14 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2f00, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) sendto$inet(r0, &(0x7f00000001c0)="3fdc0c97f1de8fdb355e7755f9f057e441ac6ab2b15eff1a2d06010be8f3496c58e674d298d63f52fc4a2da6fd648100123a2d1e86d93718f7cb85fbdcf42b50038ee2cc982e41da194bebf7e36649d5315dc180e029fb2286e0805f2c0f7aeee1623e1d93e5ab7e94f9f720e98fae0d613ae1661d9abc47e4b61ae239c4ac6359562dbb22640b77cc5ebb3992", 0x8d, 0x4040, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) socketpair(0x28, 0x800, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r5, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r5, 0x300, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x5071}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x200, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xff, 0x0, 0xfe, 0x8}, [@RTA_MARK={0x8, 0x10, 0x10a50}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:14 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(0x0, &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:14 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x40000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(r3, &(0x7f0000000040)="e6ae9418e47424d0e4f8e9d3e465a69489b0e55563b0fdf4b12cf25405edd5b114537a245c980b87fcb03ff6b06d46abfcf587fe30", 0x35) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:14 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3202, 0xffffff7f}, 0x14}}, 0x0) 03:00:14 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:14 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(0x0, &(0x7f0000000100)='./mnt\x00', 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:15 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x4120439c, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:15 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:15 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3203, 0xffffff7f}, 0x14}}, 0x0) 03:00:15 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:15 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x60000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:15 executing program 2: fsmount(0xffffffffffffffff, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x8}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:00:15 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', 0x0, 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:15 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 03:00:15 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x78000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:15 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3204, 0xffffff7f}, 0x14}}, 0x0) 03:00:15 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x7ffff000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:15 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 03:00:15 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3205, 0xffffff7f}, 0x14}}, 0x0) 03:00:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x6}, [@RTA_PREFSRC={0x8, 0x7, @remote={0xac, 0x2}}]}, 0x24}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0xa) close(r0) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000001, 0x0) 03:00:15 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', 0x0, 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:15 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x8dffffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:15 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 03:00:15 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3206, 0xffffff7f}, 0x14}}, 0x0) 03:00:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:15 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', 0x0, 0xfffffffffffffa59, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000280), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5409, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pipe2(&(0x7f0000000040), 0x84000) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f00000000c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x9c432041, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xa0050000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0xf, 0x2011e0}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3208, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xc8050000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x320a, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 278.771602][ T9827] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 278.792043][ T9827] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 278.830477][ T9827] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value 03:00:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xc, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000400000000085ecffff100000009500000000000000899f850a5aa66d6465f3014d9724363b897a4fb9759c337e9a48afdb93ebc5d4da450e8da9316f6070b0ca056db1bc5e4a39260050db6c6f3232c2f3d53bac640527"], &(0x7f0000000400)='syzkaller\x00', 0x5, 0xd5, &(0x7f00000004c0)=""/213, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) r2 = dup3(r0, r0, 0x80000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, @generic={0x8, 0xa, 0x9, 0x30, 0xb7b4}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x1f}]}, &(0x7f0000000340)='GPL\x00', 0x5, 0x53, &(0x7f0000000380)=""/83, 0x40f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x1, 0x7, 0x7}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0xd9b, 0xae, &(0x7f0000000100)=""/174, 0x40f00, 0x11, [], r1, 0x5, r2, 0x8, &(0x7f0000000240)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x3, 0x3, 0x10000}, 0x10, 0xffffffffffffffff, r3}, 0x78) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xe0ffffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x320f, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xeffdffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3211, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) dup3(r1, r2, 0x0) dup2(r0, r3) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf5ffffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3214, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfc000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 5 (fault-call:3 fault-nth:0): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3230, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfe800000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.220856][ T9901] FAULT_INJECTION: forcing a failure. [ 279.220856][ T9901] name failslab, interval 1, probability 0, space 0, times 0 [ 279.236136][ T9904] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 279.252706][ T9904] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 279.266846][ T9904] F2FS-fs (loop0): Unrecognized mount option "usrquota=f2fs" or missing value [ 279.274449][ T9901] CPU: 0 PID: 9901 Comm: syz-executor.5 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 279.285763][ T9901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.295804][ T9901] Call Trace: [ 279.299091][ T9901] dump_stack+0x1dd/0x24e [ 279.303425][ T9901] ? devkmsg_release+0x11c/0x11c [ 279.308342][ T9901] ? show_regs_print_info+0x12/0x12 [ 279.313523][ T9901] should_fail+0x6fb/0x860 [ 279.317919][ T9901] ? setup_fault_attr+0x3d0/0x3d0 [ 279.322913][ T9901] ? stack_trace_save+0x120/0x1f0 [ 279.327908][ T9901] ? __rcu_read_lock+0x50/0x50 [ 279.332640][ T9901] ? stack_trace_snprint+0x150/0x150 [ 279.337895][ T9901] ? __alloc_skb+0x88/0x4d0 [ 279.342369][ T9901] should_failslab+0x5/0x20 [ 279.346843][ T9901] kmem_cache_alloc+0x36/0x270 [ 279.351589][ T9901] __alloc_skb+0x88/0x4d0 [ 279.355889][ T9901] ? avc_denied+0x1c0/0x1c0 [ 279.360363][ T9901] alloc_skb_with_frags+0xb1/0x580 [ 279.365446][ T9901] sock_alloc_send_pskb+0x86d/0xcb0 [ 279.370617][ T9901] ? sock_kzfree_s+0x50/0x50 [ 279.375177][ T9901] ? arch_stack_walk+0xde/0x140 [ 279.380001][ T9901] ? __rcu_read_lock+0x50/0x50 [ 279.384823][ T9901] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 279.390792][ T9901] packet_sendmsg+0x3de0/0x6780 [ 279.395633][ T9901] ? __rcu_read_lock+0x50/0x50 [ 279.400373][ T9901] ? debug_smp_processor_id+0x20/0x20 [ 279.405716][ T9901] ? stack_trace_save+0x1f0/0x1f0 [ 279.410711][ T9901] ? __kernel_text_address+0x93/0x110 [ 279.416053][ T9901] ? unwind_get_return_address+0x48/0x90 [ 279.421655][ T9901] ? arch_stack_walk+0xf8/0x140 [ 279.426478][ T9901] ? memset+0x1f/0x40 [ 279.430433][ T9901] ? selinux_socket_sendmsg+0x11f/0x340 [ 279.435950][ T9901] ? selinux_socket_accept+0x5b0/0x5b0 [ 279.441380][ T9901] ? compat_packet_setsockopt+0x160/0x160 [ 279.447102][ T9901] ? rw_copy_check_uvector+0x2b3/0x310 [ 279.452554][ T9901] ? import_iovec+0x1bc/0x380 [ 279.457214][ T9901] ? security_socket_sendmsg+0xad/0xc0 [ 279.462646][ T9901] ? compat_packet_setsockopt+0x160/0x160 [ 279.468336][ T9901] ____sys_sendmsg+0x587/0x8d0 [ 279.473078][ T9901] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 279.478252][ T9901] ? proc_fail_nth_read+0x1c0/0x1c0 [ 279.483422][ T9901] __sys_sendmsg+0x2c4/0x3b0 [ 279.487988][ T9901] ? ____sys_sendmsg+0x8d0/0x8d0 [ 279.492909][ T9901] ? check_preemption_disabled+0x9e/0x330 [ 279.498603][ T9901] ? fput_many+0x42/0x1a0 [ 279.502923][ T9901] ? check_preemption_disabled+0x15a/0x330 [ 279.508720][ T9901] do_syscall_64+0xcb/0x150 [ 279.513197][ T9901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.519065][ T9901] RIP: 0033:0x45e219 [ 279.522934][ T9901] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.542521][ T9901] RSP: 002b:00007fb8b9e91c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.550901][ T9901] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 279.558863][ T9901] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfe80ffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3260, 0xffffff7f}, 0x14}}, 0x0) 03:00:16 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) dup3(r1, r2, 0x0) dup2(r0, r3) 03:00:16 executing program 5 (fault-call:3 fault-nth:1): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 279.567154][ T9901] RBP: 00007fb8b9e91ca0 R08: 0000000000000000 R09: 0000000000000000 [ 279.575097][ T9901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 279.583042][ T9901] R13: 00007fffcdf04a6f R14: 00007fb8b9e929c0 R15: 000000000119bf8c 03:00:16 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfec0ffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:17 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x32e0, 0xffffff7f}, 0x14}}, 0x0) [ 279.646418][ T9920] F2FS-fs (loop0): Unable to read 1th superblock [ 279.664369][ T9920] F2FS-fs (loop0): Unable to read 2th superblock [ 279.676218][ T9927] FAULT_INJECTION: forcing a failure. [ 279.676218][ T9927] name failslab, interval 1, probability 0, space 0, times 0 03:00:17 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfeffffff, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 279.741651][ T9927] CPU: 1 PID: 9927 Comm: syz-executor.5 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 279.751736][ T9927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.761780][ T9927] Call Trace: [ 279.765061][ T9927] dump_stack+0x1dd/0x24e [ 279.769370][ T9927] ? devkmsg_release+0x11c/0x11c [ 279.774289][ T9927] ? show_regs_print_info+0x12/0x12 [ 279.779473][ T9927] should_fail+0x6fb/0x860 [ 279.783871][ T9927] ? setup_fault_attr+0x3d0/0x3d0 [ 279.788892][ T9927] ? alloc_skb_with_frags+0xb1/0x580 [ 279.794156][ T9927] should_failslab+0x5/0x20 [ 279.798637][ T9927] __kmalloc_track_caller+0x5d/0x2c0 [ 279.803897][ T9927] ? kmem_cache_alloc+0x1e0/0x270 [ 279.808920][ T9927] ? alloc_skb_with_frags+0xb1/0x580 [ 279.814183][ T9927] __alloc_skb+0xd1/0x4d0 [ 279.818493][ T9927] ? avc_denied+0x1c0/0x1c0 [ 279.822973][ T9927] alloc_skb_with_frags+0xb1/0x580 [ 279.828062][ T9927] sock_alloc_send_pskb+0x86d/0xcb0 [ 279.833240][ T9927] ? sock_kzfree_s+0x50/0x50 [ 279.837808][ T9927] ? arch_stack_walk+0xde/0x140 [ 279.842636][ T9927] ? __rcu_read_lock+0x50/0x50 [ 279.847378][ T9927] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 279.853336][ T9927] packet_sendmsg+0x3de0/0x6780 [ 279.858165][ T9927] ? __rcu_read_lock+0x50/0x50 [ 279.862906][ T9927] ? debug_smp_processor_id+0x20/0x20 [ 279.868255][ T9927] ? stack_trace_save+0x1f0/0x1f0 [ 279.873257][ T9927] ? __kernel_text_address+0x93/0x110 [ 279.878625][ T9927] ? unwind_get_return_address+0x48/0x90 [ 279.884235][ T9927] ? arch_stack_walk+0xf8/0x140 [ 279.889065][ T9927] ? memset+0x1f/0x40 [ 279.893025][ T9927] ? selinux_socket_sendmsg+0x11f/0x340 [ 279.898548][ T9927] ? selinux_socket_accept+0x5b0/0x5b0 [ 279.904001][ T9927] ? compat_packet_setsockopt+0x160/0x160 [ 279.909700][ T9927] ? rw_copy_check_uvector+0x2b3/0x310 [ 279.915137][ T9927] ? import_iovec+0x1bc/0x380 [ 279.919810][ T9927] ? security_socket_sendmsg+0xad/0xc0 [ 279.925266][ T9927] ? compat_packet_setsockopt+0x160/0x160 [ 279.930980][ T9927] ____sys_sendmsg+0x587/0x8d0 [ 279.935733][ T9927] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 279.940925][ T9927] ? proc_fail_nth_read+0x1c0/0x1c0 [ 279.946109][ T9927] __sys_sendmsg+0x2c4/0x3b0 [ 279.950684][ T9927] ? ____sys_sendmsg+0x8d0/0x8d0 [ 279.955623][ T9927] ? check_preemption_disabled+0x9e/0x330 [ 279.961327][ T9927] ? fput_many+0x42/0x1a0 [ 279.965633][ T9927] ? check_preemption_disabled+0x15a/0x330 [ 279.971428][ T9927] do_syscall_64+0xcb/0x150 [ 279.975919][ T9927] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.981791][ T9927] RIP: 0033:0x45e219 [ 279.985666][ T9927] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.005248][ T9927] RSP: 002b:00007fb8b9e91c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.013636][ T9927] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 280.021587][ T9927] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 280.029549][ T9927] RBP: 00007fb8b9e91ca0 R08: 0000000000000000 R09: 0000000000000000 03:00:17 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) dup3(r1, r2, 0x0) dup2(r0, r3) [ 280.037504][ T9927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.045458][ T9927] R13: 00007fffcdf04a6f R14: 00007fb8b9e929c0 R15: 000000000119bf8c 03:00:17 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:17 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xff000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:17 executing program 5 (fault-call:3 fault-nth:2): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:17 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffff0000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 280.140511][ T9956] F2FS-fs (loop0): Unable to read 1th superblock [ 280.149643][ T9956] F2FS-fs (loop0): Unable to read 2th superblock [ 280.169628][ T9961] FAULT_INJECTION: forcing a failure. [ 280.169628][ T9961] name failslab, interval 1, probability 0, space 0, times 0 [ 280.182426][ T9961] CPU: 0 PID: 9961 Comm: syz-executor.5 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 280.192491][ T9961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.203839][ T9961] Call Trace: [ 280.207124][ T9961] dump_stack+0x1dd/0x24e [ 280.211438][ T9961] ? devkmsg_release+0x11c/0x11c [ 280.216362][ T9961] ? skb_flow_dissector_init+0x268/0x2b0 [ 280.221980][ T9961] ? show_regs_print_info+0x12/0x12 [ 280.227161][ T9961] ? skb_network_protocol+0x495/0x650 [ 280.232515][ T9961] should_fail+0x6fb/0x860 [ 280.236913][ T9961] ? setup_fault_attr+0x3d0/0x3d0 [ 280.241918][ T9961] ? skb_clone+0x1b2/0x370 [ 280.246325][ T9961] should_failslab+0x5/0x20 [ 280.250819][ T9961] kmem_cache_alloc+0x36/0x270 [ 280.255564][ T9961] skb_clone+0x1b2/0x370 [ 280.259788][ T9961] dev_queue_xmit_nit+0x279/0x9e0 [ 280.264794][ T9961] ? debug_smp_processor_id+0x20/0x20 [ 280.270148][ T9961] ? refcount_add_not_zero_checked+0x1aa/0x270 [ 280.276278][ T9961] xmit_one+0x7e/0x480 [ 280.280334][ T9961] ? netdev_core_pick_tx+0xc5/0x2f0 [ 280.285518][ T9961] __dev_queue_xmit+0x1935/0x2700 [ 280.290523][ T9961] ? dev_queue_xmit+0x20/0x20 [ 280.295185][ T9961] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 280.301141][ T9961] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 280.307097][ T9961] ? skb_put+0x114/0x1e0 [ 280.311317][ T9961] packet_sendmsg+0x4d2f/0x6780 [ 280.316153][ T9961] ? __rcu_read_lock+0x50/0x50 [ 280.320895][ T9961] ? debug_smp_processor_id+0x20/0x20 [ 280.326243][ T9961] ? stack_trace_save+0x1f0/0x1f0 [ 280.331243][ T9961] ? __kernel_text_address+0x93/0x110 [ 280.336588][ T9961] ? unwind_get_return_address+0x48/0x90 [ 280.342197][ T9961] ? arch_stack_walk+0xf8/0x140 [ 280.347027][ T9961] ? memset+0x1f/0x40 [ 280.350988][ T9961] ? selinux_socket_sendmsg+0x11f/0x340 [ 280.356509][ T9961] ? selinux_socket_accept+0x5b0/0x5b0 [ 280.361944][ T9961] ? compat_packet_setsockopt+0x160/0x160 [ 280.367640][ T9961] ? rw_copy_check_uvector+0x2b3/0x310 [ 280.373075][ T9961] ? import_iovec+0x1bc/0x380 [ 280.377731][ T9961] ? security_socket_sendmsg+0xad/0xc0 [ 280.383165][ T9961] ? compat_packet_setsockopt+0x160/0x160 [ 280.388863][ T9961] ____sys_sendmsg+0x587/0x8d0 [ 280.393612][ T9961] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 280.398790][ T9961] ? proc_fail_nth_read+0x1c0/0x1c0 [ 280.403965][ T9961] __sys_sendmsg+0x2c4/0x3b0 [ 280.408532][ T9961] ? ____sys_sendmsg+0x8d0/0x8d0 [ 280.413443][ T9961] ? check_preemption_disabled+0x9e/0x330 [ 280.419145][ T9961] ? fput_many+0x42/0x1a0 [ 280.423449][ T9961] ? check_preemption_disabled+0x15a/0x330 [ 280.429235][ T9961] do_syscall_64+0xcb/0x150 [ 280.433740][ T9961] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.439632][ T9961] RIP: 0033:0x45e219 [ 280.443521][ T9961] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.463112][ T9961] RSP: 002b:00007fb8b9e91c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.471511][ T9961] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 280.479467][ T9961] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 03:00:17 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3c00, 0xffffff7f}, 0x14}}, 0x0) 03:00:17 executing program 5 (fault-call:3 fault-nth:3): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:17 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:17 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 280.487419][ T9961] RBP: 00007fb8b9e91ca0 R08: 0000000000000000 R09: 0000000000000000 [ 280.495370][ T9961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 280.503318][ T9961] R13: 00007fffcdf04a6f R14: 00007fb8b9e929c0 R15: 000000000119bf8c 03:00:17 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffff80fe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 280.575190][ T9972] FAULT_INJECTION: forcing a failure. [ 280.575190][ T9972] name failslab, interval 1, probability 0, space 0, times 0 [ 280.580680][ T9973] F2FS-fs (loop0): Unable to read 1th superblock [ 280.587842][ T9972] CPU: 1 PID: 9972 Comm: syz-executor.5 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 280.587852][ T9972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.594289][ T9973] F2FS-fs (loop0): Unable to read 2th superblock [ 280.604200][ T9972] Call Trace: 03:00:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:17 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffc0fe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 280.604219][ T9972] dump_stack+0x1dd/0x24e [ 280.604227][ T9972] ? devkmsg_release+0x11c/0x11c [ 280.604234][ T9972] ? show_regs_print_info+0x12/0x12 [ 280.604242][ T9972] ? check_preemption_disabled+0x9e/0x330 [ 280.604250][ T9972] should_fail+0x6fb/0x860 [ 280.604258][ T9972] ? setup_fault_attr+0x3d0/0x3d0 [ 280.604265][ T9972] ? dst_alloc+0x137/0x4f0 [ 280.604279][ T9972] should_failslab+0x5/0x20 [ 280.662184][ T9972] kmem_cache_alloc+0x36/0x270 [ 280.666923][ T9972] ? __kasan_slab_free+0x17e/0x230 [ 280.672015][ T9972] ? slab_free_freelist_hook+0xd0/0x150 [ 280.677532][ T9972] ? kmem_cache_free+0xac/0x610 [ 280.682354][ T9972] dst_alloc+0x137/0x4f0 [ 280.686569][ T9972] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.692608][ T9972] ip_route_output_key_hash_rcu+0xe76/0x21c0 [ 280.698562][ T9972] ? ip_route_output_key_hash+0x220/0x220 [ 280.704251][ T9972] ip_route_output_key_hash+0x151/0x220 [ 280.709767][ T9972] ? ip_route_input_rcu+0x3580/0x3580 [ 280.715109][ T9972] vti_tunnel_xmit+0x5d8/0x1350 [ 280.719932][ T9972] ? packet_rcv+0x139/0x1360 [ 280.724509][ T9972] ? vti_tunnel_init+0x250/0x250 [ 280.729419][ T9972] ? debug_smp_processor_id+0x20/0x20 [ 280.734761][ T9972] xmit_one+0x239/0x480 [ 280.738889][ T9972] __dev_queue_xmit+0x1935/0x2700 [ 280.743888][ T9972] ? dev_queue_xmit+0x20/0x20 [ 280.748539][ T9972] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 280.754492][ T9972] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 280.760443][ T9972] ? skb_put+0x114/0x1e0 [ 280.764674][ T9972] packet_sendmsg+0x4d2f/0x6780 [ 280.769533][ T9972] ? __rcu_read_lock+0x50/0x50 [ 280.774267][ T9972] ? debug_smp_processor_id+0x20/0x20 [ 280.779620][ T9972] ? stack_trace_save+0x1f0/0x1f0 [ 280.784637][ T9972] ? __kernel_text_address+0x93/0x110 [ 280.789982][ T9972] ? unwind_get_return_address+0x48/0x90 [ 280.795631][ T9972] ? arch_stack_walk+0xf8/0x140 [ 280.800461][ T9972] ? memset+0x1f/0x40 [ 280.804426][ T9972] ? selinux_socket_sendmsg+0x11f/0x340 [ 280.809962][ T9972] ? selinux_socket_accept+0x5b0/0x5b0 [ 280.815394][ T9972] ? compat_packet_setsockopt+0x160/0x160 [ 280.821080][ T9972] ? rw_copy_check_uvector+0x2b3/0x310 [ 280.827029][ T9972] ? import_iovec+0x1bc/0x380 [ 280.831678][ T9972] ? security_socket_sendmsg+0xad/0xc0 [ 280.837123][ T9972] ? compat_packet_setsockopt+0x160/0x160 [ 280.842812][ T9972] ____sys_sendmsg+0x587/0x8d0 [ 280.847559][ T9972] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 280.852736][ T9972] ? proc_fail_nth_read+0x1c0/0x1c0 [ 280.857920][ T9972] __sys_sendmsg+0x2c4/0x3b0 [ 280.862481][ T9972] ? ____sys_sendmsg+0x8d0/0x8d0 [ 280.867391][ T9972] ? check_preemption_disabled+0x9e/0x330 [ 280.873083][ T9972] ? fput_many+0x42/0x1a0 [ 280.877386][ T9972] ? check_preemption_disabled+0x15a/0x330 [ 280.883189][ T9972] do_syscall_64+0xcb/0x150 [ 280.887664][ T9972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.893544][ T9972] RIP: 0033:0x45e219 [ 280.897409][ T9972] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.916983][ T9972] RSP: 002b:00007fb8b9e91c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x5900, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 5 (fault-call:3 fault-nth:4): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 280.925362][ T9972] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 280.933309][ T9972] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 280.941282][ T9972] RBP: 00007fb8b9e91ca0 R08: 0000000000000000 R09: 0000000000000000 [ 280.949230][ T9972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 280.957174][ T9972] R13: 00007fffcdf04a6f R14: 00007fb8b9e929c0 R15: 000000000119bf8c 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfffffdef, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x6c00, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x18, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffff7f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.047488][ T9995] F2FS-fs (loop0): Unable to read 1th superblock [ 281.053976][ T9995] F2FS-fs (loop0): Unable to read 2th superblock 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffff8d, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffffe0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x2}}, 0x14}}, 0x0) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 281.162591][T10012] F2FS-fs (loop0): Unable to read 1th superblock [ 281.174226][T10012] F2FS-fs (loop0): Unable to read 2th superblock 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x26, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfffffff5, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x3}}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.265332][T10047] F2FS-fs (loop0): Unable to read 1th superblock [ 281.277341][T10047] F2FS-fs (loop0): Unable to read 2th superblock 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x480, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfffffffe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x4}}, 0x14}}, 0x0) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.345568][T10066] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.357236][T10066] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 281.385080][T10066] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x7ffffffff000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x5}}, 0x14}}, 0x0) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x11, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.400531][T10066] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x14, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x6}}, 0x14}}, 0x0) 03:00:18 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x52e, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x60, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x8}}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x10000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0xa}}, 0x14}}, 0x0) [ 281.513319][T10101] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.522455][T10101] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 281.532177][T10101] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.550594][T10101] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:18 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf0ff7f00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:18 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf0ffffff7f0000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:18 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0xf}}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x100000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 281.668101][T10136] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.679540][T10136] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 281.705115][T10136] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x11}}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.735102][T10136] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:19 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x200000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x14}}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x300000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x30}}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 281.882418][T10167] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.914016][T10167] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:19 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x400000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1400, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x60}}, 0x14}}, 0x0) [ 281.967180][T10167] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 281.975853][T10167] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x500000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0xe0}}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 282.042560][T10202] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.082475][T10202] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:19 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x600000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 282.127403][T10202] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.140794][T10202] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x700000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x2}}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 282.219907][T10238] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.244860][T10238] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x800000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 282.270304][T10238] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.305061][T10238] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:19 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x900000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x3}}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x4}}, 0x14}}, 0x0) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xa00000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 282.421428][T10278] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.448775][T10278] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 282.483410][T10278] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.509724][T10278] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:19 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf00000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x5}}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x6}}, 0x14}}, 0x0) 03:00:19 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:19 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x1000000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 282.612525][T10312] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.620384][T10312] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 282.644268][T10312] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x8}}, 0x14}}, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x1100000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 282.667785][T10312] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0xa}}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x2001001000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 282.759194][T10352] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.767085][T10352] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 282.794385][T10352] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f00000002", 0x35, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x2002000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0xf}}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 282.821375][T10352] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x3f00000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x11}}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2600, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 282.907161][T10376] F2FS-fs (loop0): Invalid segment/section count (31, 24 x 1) [ 282.916791][T10376] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 282.932476][T10376] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 282.945742][T10376] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f00000002", 0x35, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x4000000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2e05, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x14}}, 0x14}}, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x4120439c00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x30}}, 0x14}}, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x14000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 283.058436][T10412] F2FS-fs (loop0): Invalid segment/section count (31, 24 x 1) [ 283.068681][T10412] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 283.089099][T10412] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 283.112673][T10412] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f00000002", 0x35, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x6000000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x60}}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x7800000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0xe0}}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 283.222579][T10449] F2FS-fs (loop0): Invalid segment/section count (31, 24 x 1) [ 283.231527][T10449] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 283.259277][T10449] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x8000000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f000000020000000200000002000000010000001800000000020000000200", 0x4f, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x8dffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe0000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 283.273775][T10449] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xff03, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x2}}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xa005000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) [ 283.373550][T10481] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 283.387009][T10481] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 283.407561][T10481] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f000000020000000200000002000000010000001800000000020000000200", 0x4f, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x3, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xc805000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x3}}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) [ 283.428500][T10481] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xe0ffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xeffdffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x5, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 283.501577][T10511] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 283.521382][T10511] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 283.533739][T10511] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) [ 283.545567][T10511] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:20 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f000000020000000200000002000000010000001800000000020000000200", 0x4f, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:20 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf5ffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x5}}, 0x14}}, 0x0) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:00:20 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0xa, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:00:20 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x6}}, 0x14}}, 0x0) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfc00000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 283.654220][T10541] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 283.662696][T10541] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 283.691647][T10541] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:21 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x3, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 283.714587][T10541] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:21 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x8}}, 0x14}}, 0x0) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfe80000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x5, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:21 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xf5ffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:21 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000", 0x5c, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:21 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xa}}, 0x14}}, 0x0) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfe80ffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 2 (fault-call:3 fault-nth:0): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:21 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xa, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfec0ffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 283.844897][T10577] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 283.861572][T10577] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:21 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xf}}, 0x14}}, 0x0) 03:00:21 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3202, 0xffffff7f}, 0x14}}, 0x0) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xfeffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 283.914039][T10577] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 283.928372][T10596] FAULT_INJECTION: forcing a failure. [ 283.928372][T10596] name failslab, interval 1, probability 0, space 0, times 0 [ 283.944861][T10577] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 283.974149][T10596] CPU: 0 PID: 10596 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 283.984324][T10596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.994378][T10596] Call Trace: [ 283.997671][T10596] dump_stack+0x1dd/0x24e [ 284.002045][T10596] ? devkmsg_release+0x11c/0x11c [ 284.006974][T10596] ? show_regs_print_info+0x12/0x12 [ 284.012149][T10596] should_fail+0x6fb/0x860 [ 284.016538][T10596] ? setup_fault_attr+0x3d0/0x3d0 [ 284.021575][T10596] ? stack_trace_save+0x120/0x1f0 [ 284.026569][T10596] ? __rcu_read_lock+0x50/0x50 [ 284.031301][T10596] ? stack_trace_snprint+0x150/0x150 [ 284.036568][T10596] ? __alloc_skb+0x88/0x4d0 [ 284.041039][T10596] should_failslab+0x5/0x20 [ 284.045522][T10596] kmem_cache_alloc+0x36/0x270 [ 284.050269][T10596] __alloc_skb+0x88/0x4d0 [ 284.054567][T10596] ? avc_denied+0x1c0/0x1c0 [ 284.059039][T10596] alloc_skb_with_frags+0xb1/0x580 [ 284.064128][T10596] sock_alloc_send_pskb+0x86d/0xcb0 [ 284.069300][T10596] ? sock_kzfree_s+0x50/0x50 [ 284.073858][T10596] ? arch_stack_walk+0xde/0x140 [ 284.078677][T10596] ? __rcu_read_lock+0x50/0x50 [ 284.083420][T10596] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 284.089367][T10596] packet_sendmsg+0x3de0/0x6780 [ 284.094273][T10596] ? __rcu_read_lock+0x50/0x50 [ 284.099021][T10596] ? debug_smp_processor_id+0x20/0x20 [ 284.104376][T10596] ? stack_trace_save+0x1f0/0x1f0 [ 284.109381][T10596] ? __kernel_text_address+0x93/0x110 [ 284.114724][T10596] ? unwind_get_return_address+0x48/0x90 [ 284.120326][T10596] ? arch_stack_walk+0xf8/0x140 [ 284.125170][T10596] ? memset+0x1f/0x40 [ 284.129139][T10596] ? selinux_socket_sendmsg+0x11f/0x340 [ 284.134662][T10596] ? selinux_socket_accept+0x5b0/0x5b0 [ 284.140090][T10596] ? compat_packet_setsockopt+0x160/0x160 [ 284.145779][T10596] ? rw_copy_check_uvector+0x2b3/0x310 [ 284.151205][T10596] ? import_iovec+0x1bc/0x380 [ 284.155864][T10596] ? security_socket_sendmsg+0xad/0xc0 [ 284.161289][T10596] ? compat_packet_setsockopt+0x160/0x160 [ 284.166974][T10596] ____sys_sendmsg+0x587/0x8d0 [ 284.171708][T10596] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 284.176890][T10596] ? proc_fail_nth_read+0x1c0/0x1c0 [ 284.182056][T10596] __sys_sendmsg+0x2c4/0x3b0 [ 284.186631][T10596] ? ____sys_sendmsg+0x8d0/0x8d0 [ 284.191538][T10596] ? check_preemption_disabled+0x9e/0x330 [ 284.197240][T10596] ? fput_many+0x42/0x1a0 [ 284.201538][T10596] ? check_preemption_disabled+0x15a/0x330 [ 284.207317][T10596] do_syscall_64+0xcb/0x150 [ 284.211790][T10596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.217652][T10596] RIP: 0033:0x45e219 [ 284.221537][T10596] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.241114][T10596] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.249593][T10596] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 284.257545][T10596] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 284.265485][T10596] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 03:00:21 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x11}}, 0x14}}, 0x0) 03:00:21 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000", 0x5c, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xff00000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:21 executing program 2 (fault-call:3 fault-nth:1): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 284.273439][T10596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 284.281377][T10596] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:21 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3203, 0xffffff7f}, 0x14}}, 0x0) 03:00:21 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x14}}, 0x14}}, 0x0) 03:00:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:21 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffff000000000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 284.352696][T10624] FAULT_INJECTION: forcing a failure. [ 284.352696][T10624] name failslab, interval 1, probability 0, space 0, times 0 [ 284.392199][T10625] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 284.405508][T10625] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 284.414390][T10624] CPU: 0 PID: 10624 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 284.417471][T10625] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 284.424541][T10624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.433716][T10625] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 284.442287][T10624] Call Trace: [ 284.442304][T10624] dump_stack+0x1dd/0x24e [ 284.442312][T10624] ? devkmsg_release+0x11c/0x11c [ 284.442320][T10624] ? show_regs_print_info+0x12/0x12 [ 284.442335][T10624] should_fail+0x6fb/0x860 [ 284.472473][T10624] ? setup_fault_attr+0x3d0/0x3d0 [ 284.477468][T10624] ? alloc_skb_with_frags+0xb1/0x580 [ 284.482829][T10624] should_failslab+0x5/0x20 [ 284.487307][T10624] __kmalloc_track_caller+0x5d/0x2c0 [ 284.492570][T10624] ? kmem_cache_alloc+0x1e0/0x270 [ 284.497588][T10624] ? alloc_skb_with_frags+0xb1/0x580 [ 284.502841][T10624] __alloc_skb+0xd1/0x4d0 [ 284.507146][T10624] ? avc_denied+0x1c0/0x1c0 [ 284.511622][T10624] alloc_skb_with_frags+0xb1/0x580 [ 284.516704][T10624] sock_alloc_send_pskb+0x86d/0xcb0 [ 284.521873][T10624] ? sock_kzfree_s+0x50/0x50 [ 284.526433][T10624] ? arch_stack_walk+0xde/0x140 [ 284.531256][T10624] ? __rcu_read_lock+0x50/0x50 [ 284.535989][T10624] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 284.541938][T10624] packet_sendmsg+0x3de0/0x6780 [ 284.546774][T10624] ? __rcu_read_lock+0x50/0x50 [ 284.551507][T10624] ? debug_smp_processor_id+0x20/0x20 [ 284.556850][T10624] ? stack_trace_save+0x1f0/0x1f0 [ 284.561860][T10624] ? __kernel_text_address+0x93/0x110 [ 284.567199][T10624] ? unwind_get_return_address+0x48/0x90 [ 284.572799][T10624] ? arch_stack_walk+0xf8/0x140 [ 284.577634][T10624] ? memset+0x1f/0x40 [ 284.581584][T10624] ? selinux_socket_sendmsg+0x11f/0x340 [ 284.587102][T10624] ? selinux_socket_accept+0x5b0/0x5b0 [ 284.592535][T10624] ? compat_packet_setsockopt+0x160/0x160 [ 284.598226][T10624] ? rw_copy_check_uvector+0x2b3/0x310 [ 284.603661][T10624] ? import_iovec+0x1bc/0x380 [ 284.608332][T10624] ? security_socket_sendmsg+0xad/0xc0 [ 284.613764][T10624] ? compat_packet_setsockopt+0x160/0x160 [ 284.619452][T10624] ____sys_sendmsg+0x587/0x8d0 [ 284.624190][T10624] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 284.629359][T10624] ? proc_fail_nth_read+0x1c0/0x1c0 [ 284.634546][T10624] __sys_sendmsg+0x2c4/0x3b0 [ 284.639126][T10624] ? ____sys_sendmsg+0x8d0/0x8d0 [ 284.644034][T10624] ? check_preemption_disabled+0x9e/0x330 [ 284.649739][T10624] ? fput_many+0x42/0x1a0 [ 284.654038][T10624] ? check_preemption_disabled+0x15a/0x330 [ 284.659817][T10624] do_syscall_64+0xcb/0x150 [ 284.664291][T10624] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.670154][T10624] RIP: 0033:0x45e219 [ 284.674018][T10624] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.693610][T10624] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:00:22 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffff7f00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:22 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3204, 0xffffff7f}, 0x14}}, 0x0) 03:00:22 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x30}}, 0x14}}, 0x0) 03:00:22 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000", 0x5c, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 284.702002][T10624] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 284.709945][T10624] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 284.717884][T10624] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 284.725824][T10624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.733762][T10624] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:22 executing program 2 (fault-call:3 fault-nth:2): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:22 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0xffffffff00000000, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:22 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x60}}, 0x14}}, 0x0) [ 284.813876][T10657] FAULT_INJECTION: forcing a failure. [ 284.813876][T10657] name failslab, interval 1, probability 0, space 0, times 0 [ 284.824154][T10652] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(0) [ 284.826517][T10657] CPU: 1 PID: 10657 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 284.826526][T10657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.838151][T10652] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 284.844303][T10657] Call Trace: [ 284.844323][T10657] dump_stack+0x1dd/0x24e [ 284.844333][T10657] ? devkmsg_release+0x11c/0x11c [ 284.844347][T10657] ? skb_flow_dissector_init+0x268/0x2b0 [ 284.880650][T10657] ? show_regs_print_info+0x12/0x12 [ 284.882784][T10652] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 284.885844][T10657] ? skb_network_protocol+0x495/0x650 [ 284.885855][T10657] should_fail+0x6fb/0x860 [ 284.885864][T10657] ? setup_fault_attr+0x3d0/0x3d0 [ 284.885872][T10657] ? skb_clone+0x1b2/0x370 03:00:22 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 284.885880][T10657] should_failslab+0x5/0x20 [ 284.885894][T10657] kmem_cache_alloc+0x36/0x270 [ 284.896633][T10652] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 284.898950][T10657] skb_clone+0x1b2/0x370 [ 284.898960][T10657] dev_queue_xmit_nit+0x279/0x9e0 [ 284.898974][T10657] ? debug_smp_processor_id+0x20/0x20 [ 284.944712][T10657] ? refcount_add_not_zero_checked+0x1aa/0x270 [ 284.950936][T10657] xmit_one+0x7e/0x480 [ 284.954998][T10657] ? netdev_core_pick_tx+0xc5/0x2f0 [ 284.960173][T10657] __dev_queue_xmit+0x1935/0x2700 [ 284.965174][T10657] ? dev_queue_xmit+0x20/0x20 [ 284.969824][T10657] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 284.975778][T10657] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 284.981731][T10657] ? skb_put+0x114/0x1e0 [ 284.985946][T10657] packet_sendmsg+0x4d2f/0x6780 [ 284.990772][T10657] ? __rcu_read_lock+0x50/0x50 [ 284.995513][T10657] ? debug_smp_processor_id+0x20/0x20 [ 285.000874][T10657] ? stack_trace_save+0x1f0/0x1f0 [ 285.005874][T10657] ? __kernel_text_address+0x93/0x110 [ 285.011236][T10657] ? unwind_get_return_address+0x48/0x90 [ 285.016840][T10657] ? arch_stack_walk+0xf8/0x140 [ 285.021662][T10657] ? memset+0x1f/0x40 [ 285.025616][T10657] ? selinux_socket_sendmsg+0x11f/0x340 [ 285.031133][T10657] ? selinux_socket_accept+0x5b0/0x5b0 [ 285.036566][T10657] ? compat_packet_setsockopt+0x160/0x160 [ 285.042256][T10657] ? rw_copy_check_uvector+0x2b3/0x310 [ 285.047685][T10657] ? import_iovec+0x1bc/0x380 [ 285.052358][T10657] ? security_socket_sendmsg+0xad/0xc0 [ 285.057811][T10657] ? compat_packet_setsockopt+0x160/0x160 [ 285.063502][T10657] ____sys_sendmsg+0x587/0x8d0 [ 285.068243][T10657] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 285.073414][T10657] ? proc_fail_nth_read+0x1c0/0x1c0 [ 285.078608][T10657] __sys_sendmsg+0x2c4/0x3b0 [ 285.083177][T10657] ? ____sys_sendmsg+0x8d0/0x8d0 [ 285.088086][T10657] ? check_preemption_disabled+0x9e/0x330 [ 285.093778][T10657] ? fput_many+0x42/0x1a0 [ 285.098106][T10657] ? check_preemption_disabled+0x15a/0x330 [ 285.103904][T10657] do_syscall_64+0xcb/0x150 [ 285.108408][T10657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 285.114283][T10657] RIP: 0033:0x45e219 [ 285.118190][T10657] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.137903][T10657] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 285.146288][T10657] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 285.154246][T10657] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 03:00:22 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3208, 0xffffff7f}, 0x14}}, 0x0) 03:00:22 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xe0}}, 0x14}}, 0x0) 03:00:22 executing program 2 (fault-call:3 fault-nth:3): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:22 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000", 0x63, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 285.162190][T10657] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 285.170134][T10657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 285.178190][T10657] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c [ 285.247366][T10674] FAULT_INJECTION: forcing a failure. [ 285.247366][T10674] name failslab, interval 1, probability 0, space 0, times 0 [ 285.260029][T10674] CPU: 0 PID: 10674 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 285.262227][T10673] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(3) [ 285.270165][T10674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.270169][T10674] Call Trace: [ 285.270186][T10674] dump_stack+0x1dd/0x24e 03:00:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:22 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 285.270195][T10674] ? devkmsg_release+0x11c/0x11c [ 285.270203][T10674] ? show_regs_print_info+0x12/0x12 [ 285.270212][T10674] ? check_preemption_disabled+0x9e/0x330 [ 285.270225][T10674] should_fail+0x6fb/0x860 [ 285.308557][T10673] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 285.311257][T10674] ? setup_fault_attr+0x3d0/0x3d0 [ 285.311273][T10674] ? dst_alloc+0x137/0x4f0 [ 285.318190][T10673] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 285.323796][T10674] should_failslab+0x5/0x20 [ 285.323808][T10674] kmem_cache_alloc+0x36/0x270 [ 285.338330][T10673] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 285.341020][T10674] ? __kasan_slab_free+0x17e/0x230 [ 285.341028][T10674] ? slab_free_freelist_hook+0xd0/0x150 [ 285.341039][T10674] ? kmem_cache_free+0xac/0x610 [ 285.373794][T10674] dst_alloc+0x137/0x4f0 [ 285.378115][T10674] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 285.384183][T10674] ip_route_output_key_hash_rcu+0xe76/0x21c0 [ 285.390163][T10674] ? ip_route_output_key_hash+0x220/0x220 [ 285.395863][T10674] ip_route_output_key_hash+0x151/0x220 [ 285.401385][T10674] ? ip_route_input_rcu+0x3580/0x3580 [ 285.406735][T10674] vti_tunnel_xmit+0x5d8/0x1350 [ 285.411561][T10674] ? packet_rcv+0x139/0x1360 [ 285.416128][T10674] ? vti_tunnel_init+0x250/0x250 [ 285.421037][T10674] ? debug_smp_processor_id+0x20/0x20 [ 285.426380][T10674] xmit_one+0x239/0x480 [ 285.430508][T10674] __dev_queue_xmit+0x1935/0x2700 [ 285.435506][T10674] ? dev_queue_xmit+0x20/0x20 [ 285.440153][T10674] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 285.446102][T10674] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 285.452054][T10674] ? skb_put+0x114/0x1e0 [ 285.456267][T10674] packet_sendmsg+0x4d2f/0x6780 [ 285.461096][T10674] ? __rcu_read_lock+0x50/0x50 [ 285.465850][T10674] ? debug_smp_processor_id+0x20/0x20 [ 285.471202][T10674] ? stack_trace_save+0x1f0/0x1f0 [ 285.476198][T10674] ? __kernel_text_address+0x93/0x110 [ 285.481541][T10674] ? unwind_get_return_address+0x48/0x90 [ 285.487161][T10674] ? arch_stack_walk+0xf8/0x140 [ 285.491997][T10674] ? memset+0x1f/0x40 [ 285.495957][T10674] ? selinux_socket_sendmsg+0x11f/0x340 [ 285.501471][T10674] ? selinux_socket_accept+0x5b0/0x5b0 [ 285.506902][T10674] ? compat_packet_setsockopt+0x160/0x160 [ 285.512591][T10674] ? rw_copy_check_uvector+0x2b3/0x310 [ 285.518034][T10674] ? import_iovec+0x1bc/0x380 [ 285.522680][T10674] ? security_socket_sendmsg+0xad/0xc0 [ 285.528117][T10674] ? compat_packet_setsockopt+0x160/0x160 [ 285.533809][T10674] ____sys_sendmsg+0x587/0x8d0 [ 285.538547][T10674] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 285.543716][T10674] ? proc_fail_nth_read+0x1c0/0x1c0 [ 285.548885][T10674] __sys_sendmsg+0x2c4/0x3b0 [ 285.553710][T10674] ? ____sys_sendmsg+0x8d0/0x8d0 [ 285.558625][T10674] ? check_preemption_disabled+0x9e/0x330 [ 285.564420][T10674] ? fput_many+0x42/0x1a0 [ 285.568778][T10674] ? check_preemption_disabled+0x15a/0x330 [ 285.574567][T10674] do_syscall_64+0xcb/0x150 [ 285.579044][T10674] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 285.584907][T10674] RIP: 0033:0x45e219 [ 285.588780][T10674] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.608396][T10674] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 285.616781][T10674] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 285.624741][T10674] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 285.632686][T10674] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 285.640628][T10674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 03:00:22 executing program 2 (fault-call:3 fault-nth:4): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:23 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x320f, 0xffffff7f}, 0x14}}, 0x0) 03:00:23 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000", 0x63, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 285.648571][T10674] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:23 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x1f4}}, 0x14}}, 0x0) 03:00:23 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 285.711344][T10689] FAULT_INJECTION: forcing a failure. [ 285.711344][T10689] name failslab, interval 1, probability 0, space 0, times 0 [ 285.724013][T10689] CPU: 1 PID: 10689 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 285.734150][T10689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.744318][T10689] Call Trace: [ 285.747609][T10689] dump_stack+0x1dd/0x24e [ 285.751935][T10689] ? devkmsg_release+0x11c/0x11c [ 285.756874][T10689] ? show_regs_print_info+0x12/0x12 [ 285.758167][T10694] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(3) [ 285.762065][T10689] ? fib_result_prefsrc+0x87/0x4a0 [ 285.762078][T10689] ? memset+0x1f/0x40 [ 285.776445][T10694] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 285.778774][T10689] ? unwind_next_frame+0x1aa9/0x1f30 [ 285.778785][T10689] should_fail+0x6fb/0x860 [ 285.778798][T10689] ? setup_fault_attr+0x3d0/0x3d0 [ 285.790222][T10694] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:23 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 285.792215][T10689] ? fib_table_lookup+0x1188/0x1c60 [ 285.792224][T10689] ? dst_alloc+0x137/0x4f0 [ 285.792237][T10689] should_failslab+0x5/0x20 [ 285.797740][T10694] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 285.801634][T10689] kmem_cache_alloc+0x36/0x270 [ 285.801643][T10689] ? __rcu_read_lock+0x50/0x50 [ 285.801655][T10689] dst_alloc+0x137/0x4f0 [ 285.845272][T10689] ip_route_output_key_hash_rcu+0xe76/0x21c0 [ 285.851271][T10689] ? ip_route_output_key_hash+0x220/0x220 [ 285.856983][T10689] ? stack_trace_save+0x120/0x1f0 [ 285.861996][T10689] ip_route_output_key_hash+0x151/0x220 [ 285.867520][T10689] ? ip_route_input_rcu+0x3580/0x3580 [ 285.872865][T10689] ? make_kuid+0x228/0x3a0 [ 285.877257][T10689] ? __put_user_ns+0x50/0x50 [ 285.881820][T10689] __icmp_send+0xf94/0x2270 [ 285.886312][T10689] ? icmp_out_count+0x90/0x90 [ 285.890961][T10689] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 285.896153][T10689] ? check_preemption_disabled+0x9e/0x330 [ 285.901849][T10689] ? debug_smp_processor_id+0x20/0x20 [ 285.907202][T10689] ? __local_bh_enable_ip+0x48/0x70 [ 285.912368][T10689] ? rt_set_nexthop+0x48c/0x1140 [ 285.917279][T10689] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 285.923499][T10689] ? memset+0x1f/0x40 [ 285.927462][T10689] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 285.933094][T10689] ipv4_link_failure+0x3fa/0x760 [ 285.938013][T10689] ? ipv4_negative_advice+0x110/0x110 [ 285.943357][T10689] ? ipv4_negative_advice+0x110/0x110 [ 285.948702][T10689] vti_tunnel_xmit+0x10c8/0x1350 [ 285.953613][T10689] ? packet_rcv+0x139/0x1360 [ 285.958175][T10689] ? vti_tunnel_init+0x250/0x250 [ 285.963085][T10689] ? debug_smp_processor_id+0x20/0x20 [ 285.968432][T10689] xmit_one+0x239/0x480 [ 285.972561][T10689] __dev_queue_xmit+0x1935/0x2700 [ 285.977594][T10689] ? dev_queue_xmit+0x20/0x20 [ 285.982262][T10689] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 285.988218][T10689] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 285.994257][T10689] ? skb_put+0x114/0x1e0 [ 285.998481][T10689] packet_sendmsg+0x4d2f/0x6780 [ 286.003316][T10689] ? __rcu_read_lock+0x50/0x50 [ 286.008051][T10689] ? debug_smp_processor_id+0x20/0x20 [ 286.013395][T10689] ? stack_trace_save+0x1f0/0x1f0 [ 286.018409][T10689] ? __kernel_text_address+0x93/0x110 [ 286.023756][T10689] ? unwind_get_return_address+0x48/0x90 [ 286.029362][T10689] ? arch_stack_walk+0xf8/0x140 [ 286.034185][T10689] ? memset+0x1f/0x40 [ 286.038140][T10689] ? selinux_socket_sendmsg+0x11f/0x340 [ 286.043655][T10689] ? selinux_socket_accept+0x5b0/0x5b0 [ 286.049088][T10689] ? compat_packet_setsockopt+0x160/0x160 [ 286.054784][T10689] ? rw_copy_check_uvector+0x2b3/0x310 [ 286.060223][T10689] ? import_iovec+0x1bc/0x380 [ 286.064873][T10689] ? security_socket_sendmsg+0xad/0xc0 [ 286.070320][T10689] ? compat_packet_setsockopt+0x160/0x160 [ 286.076028][T10689] ____sys_sendmsg+0x587/0x8d0 [ 286.081005][T10689] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 286.086195][T10689] ? proc_fail_nth_read+0x1c0/0x1c0 [ 286.091378][T10689] __sys_sendmsg+0x2c4/0x3b0 [ 286.095956][T10689] ? ____sys_sendmsg+0x8d0/0x8d0 [ 286.100960][T10689] ? check_preemption_disabled+0x9e/0x330 [ 286.106658][T10689] ? fput_many+0x42/0x1a0 [ 286.111020][T10689] ? check_preemption_disabled+0x15a/0x330 [ 286.116801][T10689] do_syscall_64+0xcb/0x150 [ 286.121288][T10689] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.127161][T10689] RIP: 0033:0x45e219 [ 286.131027][T10689] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.150601][T10689] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:00:23 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x300}}, 0x14}}, 0x0) 03:00:23 executing program 2 (fault-call:3 fault-nth:5): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:23 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3211, 0xffffff7f}, 0x14}}, 0x0) 03:00:23 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000", 0x63, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 286.158989][T10689] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 286.166940][T10689] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 286.174892][T10689] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 286.182836][T10689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 286.190781][T10689] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xd000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 286.261578][T10713] FAULT_INJECTION: forcing a failure. [ 286.261578][T10713] name failslab, interval 1, probability 0, space 0, times 0 [ 286.274326][T10713] CPU: 1 PID: 10713 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 286.284464][T10713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.294512][T10713] Call Trace: [ 286.297801][T10713] dump_stack+0x1dd/0x24e [ 286.302130][T10713] ? devkmsg_release+0x11c/0x11c 03:00:23 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3214, 0xffffff7f}, 0x14}}, 0x0) [ 286.307067][T10713] ? show_regs_print_info+0x12/0x12 [ 286.312274][T10713] should_fail+0x6fb/0x860 [ 286.316689][T10713] ? setup_fault_attr+0x3d0/0x3d0 [ 286.321708][T10713] ? debug_smp_processor_id+0x20/0x20 [ 286.324215][T10722] F2FS-fs (loop0): Invalid Fs Meta Ino: node(0) meta(0) root(3) [ 286.327077][T10713] ? dst_alloc+0x137/0x4f0 [ 286.327087][T10713] should_failslab+0x5/0x20 [ 286.327095][T10713] kmem_cache_alloc+0x36/0x270 [ 286.327102][T10713] dst_alloc+0x137/0x4f0 [ 286.327115][T10713] ip_route_output_key_hash_rcu+0xe76/0x21c0 03:00:23 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:23 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 286.334864][T10722] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 286.339124][T10713] ? ip_route_output_key_hash+0x220/0x220 [ 286.339136][T10713] ip_route_output_flow+0x150/0x340 [ 286.343822][T10722] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 286.348354][T10713] ? ipv4_sk_update_pmtu+0x1e20/0x1e20 [ 286.348365][T10713] __icmp_send+0x115c/0x2270 [ 286.348374][T10713] ? icmp_out_count+0x90/0x90 [ 286.348383][T10713] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 286.348391][T10713] ? check_preemption_disabled+0x9e/0x330 [ 286.348399][T10713] ? __local_bh_enable_ip+0x48/0x70 [ 286.348405][T10713] ? rt_set_nexthop+0x48c/0x1140 [ 286.348416][T10713] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 286.348425][T10713] ? memset+0x1f/0x40 [ 286.348432][T10713] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 286.348443][T10713] ipv4_link_failure+0x3fa/0x760 [ 286.368825][T10722] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 286.372470][T10713] ? ipv4_negative_advice+0x110/0x110 [ 286.372478][T10713] ? ipv4_negative_advice+0x110/0x110 [ 286.372490][T10713] vti_tunnel_xmit+0x10c8/0x1350 [ 286.465400][T10713] ? packet_rcv+0x139/0x1360 [ 286.469963][T10713] ? vti_tunnel_init+0x250/0x250 [ 286.474874][T10713] ? debug_smp_processor_id+0x20/0x20 [ 286.480231][T10713] xmit_one+0x239/0x480 [ 286.484360][T10713] __dev_queue_xmit+0x1935/0x2700 [ 286.489358][T10713] ? dev_queue_xmit+0x20/0x20 [ 286.494019][T10713] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 286.499977][T10713] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 286.505925][T10713] ? skb_put+0x114/0x1e0 [ 286.510140][T10713] packet_sendmsg+0x4d2f/0x6780 [ 286.514980][T10713] ? __rcu_read_lock+0x50/0x50 [ 286.519731][T10713] ? debug_smp_processor_id+0x20/0x20 [ 286.525083][T10713] ? stack_trace_save+0x1f0/0x1f0 [ 286.530091][T10713] ? __kernel_text_address+0x93/0x110 [ 286.535438][T10713] ? unwind_get_return_address+0x48/0x90 [ 286.541042][T10713] ? arch_stack_walk+0xf8/0x140 [ 286.545871][T10713] ? memset+0x1f/0x40 [ 286.549825][T10713] ? selinux_socket_sendmsg+0x11f/0x340 [ 286.555341][T10713] ? selinux_socket_accept+0x5b0/0x5b0 [ 286.560770][T10713] ? compat_packet_setsockopt+0x160/0x160 [ 286.566459][T10713] ? rw_copy_check_uvector+0x2b3/0x310 [ 286.571888][T10713] ? import_iovec+0x1bc/0x380 [ 286.576538][T10713] ? security_socket_sendmsg+0xad/0xc0 [ 286.581967][T10713] ? compat_packet_setsockopt+0x160/0x160 [ 286.587664][T10713] ____sys_sendmsg+0x587/0x8d0 [ 286.592420][T10713] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 286.597591][T10713] ? proc_fail_nth_read+0x1c0/0x1c0 [ 286.602760][T10713] __sys_sendmsg+0x2c4/0x3b0 [ 286.607338][T10713] ? ____sys_sendmsg+0x8d0/0x8d0 [ 286.612245][T10713] ? check_preemption_disabled+0x9e/0x330 [ 286.617949][T10713] ? fput_many+0x42/0x1a0 [ 286.622286][T10713] ? check_preemption_disabled+0x15a/0x330 [ 286.628078][T10713] do_syscall_64+0xcb/0x150 [ 286.632554][T10713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.638417][T10713] RIP: 0033:0x45e219 [ 286.642283][T10713] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:00:24 executing program 2 (fault-call:3 fault-nth:6): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:24 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100", 0x66, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 286.661882][T10713] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 286.670264][T10713] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 286.678206][T10713] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 286.686166][T10713] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 286.694128][T10713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 286.702086][T10713] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:24 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x3e8}}, 0x14}}, 0x0) 03:00:24 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3260, 0xffffff7f}, 0x14}}, 0x0) 03:00:24 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 286.760481][T10738] FAULT_INJECTION: forcing a failure. [ 286.760481][T10738] name failslab, interval 1, probability 0, space 0, times 0 [ 286.773141][T10738] CPU: 1 PID: 10738 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 286.783281][T10738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.793326][T10738] Call Trace: [ 286.796613][T10738] dump_stack+0x1dd/0x24e [ 286.800942][T10738] ? devkmsg_release+0x11c/0x11c [ 286.805874][T10738] ? memset+0x1f/0x40 03:00:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 286.809850][T10738] ? show_regs_print_info+0x12/0x12 [ 286.815046][T10738] ? ip_route_input_rcu+0xa3c/0x3580 [ 286.820327][T10738] should_fail+0x6fb/0x860 [ 286.824738][T10738] ? setup_fault_attr+0x3d0/0x3d0 [ 286.829755][T10738] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 286.834170][T10740] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 286.835984][T10738] ? check_preemption_disabled+0x9e/0x330 [ 286.835994][T10738] ? ip_setup_cork+0x4fe/0x810 [ 286.836001][T10738] should_failslab+0x5/0x20 [ 286.836009][T10738] kmem_cache_alloc_trace+0x39/0x290 [ 286.836026][T10738] ip_setup_cork+0x4fe/0x810 [ 286.843715][T10740] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 286.849330][T10738] ip_append_data+0x155/0x1a0 [ 286.849338][T10738] ? icmp_err+0x280/0x280 [ 286.849345][T10738] icmp_push_reply+0x100/0x440 [ 286.849355][T10738] __icmp_send+0x1a50/0x2270 [ 286.849364][T10738] ? icmp_out_count+0x90/0x90 [ 286.849373][T10738] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 286.849381][T10738] ? check_preemption_disabled+0x9e/0x330 [ 286.849389][T10738] ? __local_bh_enable_ip+0x48/0x70 [ 286.849401][T10738] ? rt_set_nexthop+0x48c/0x1140 [ 286.865775][T10740] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 286.868455][T10738] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 286.868469][T10738] ? memset+0x1f/0x40 [ 286.880335][T10740] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 286.881369][T10738] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 286.881384][T10738] ipv4_link_failure+0x3fa/0x760 [ 286.957153][T10738] ? ipv4_negative_advice+0x110/0x110 [ 286.962495][T10738] ? ipv4_negative_advice+0x110/0x110 [ 286.967835][T10738] vti_tunnel_xmit+0x10c8/0x1350 [ 286.972743][T10738] ? packet_rcv+0x139/0x1360 [ 286.977302][T10738] ? vti_tunnel_init+0x250/0x250 [ 286.982228][T10738] ? debug_smp_processor_id+0x20/0x20 [ 286.987575][T10738] xmit_one+0x239/0x480 [ 286.991711][T10738] __dev_queue_xmit+0x1935/0x2700 [ 286.996717][T10738] ? dev_queue_xmit+0x20/0x20 [ 287.001371][T10738] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 287.007336][T10738] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 287.013282][T10738] ? skb_put+0x114/0x1e0 [ 287.017497][T10738] packet_sendmsg+0x4d2f/0x6780 [ 287.022324][T10738] ? __rcu_read_lock+0x50/0x50 [ 287.027059][T10738] ? debug_smp_processor_id+0x20/0x20 [ 287.032410][T10738] ? stack_trace_save+0x1f0/0x1f0 [ 287.037405][T10738] ? __kernel_text_address+0x93/0x110 [ 287.042773][T10738] ? unwind_get_return_address+0x48/0x90 [ 287.048376][T10738] ? arch_stack_walk+0xf8/0x140 [ 287.053197][T10738] ? memset+0x1f/0x40 [ 287.057150][T10738] ? selinux_socket_sendmsg+0x11f/0x340 [ 287.062672][T10738] ? selinux_socket_accept+0x5b0/0x5b0 [ 287.068209][T10738] ? compat_packet_setsockopt+0x160/0x160 [ 287.073903][T10738] ? rw_copy_check_uvector+0x2b3/0x310 [ 287.079422][T10738] ? import_iovec+0x1bc/0x380 [ 287.084070][T10738] ? security_socket_sendmsg+0xad/0xc0 [ 287.089506][T10738] ? compat_packet_setsockopt+0x160/0x160 [ 287.095201][T10738] ____sys_sendmsg+0x587/0x8d0 [ 287.099958][T10738] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 287.105138][T10738] ? proc_fail_nth_read+0x1c0/0x1c0 [ 287.110314][T10738] __sys_sendmsg+0x2c4/0x3b0 [ 287.114876][T10738] ? ____sys_sendmsg+0x8d0/0x8d0 [ 287.119791][T10738] ? check_preemption_disabled+0x9e/0x330 [ 287.125485][T10738] ? fput_many+0x42/0x1a0 [ 287.129788][T10738] ? check_preemption_disabled+0x15a/0x330 [ 287.135587][T10738] do_syscall_64+0xcb/0x150 [ 287.140065][T10738] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.145927][T10738] RIP: 0033:0x45e219 [ 287.149792][T10738] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.169366][T10738] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.177746][T10738] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 287.185703][T10738] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 287.193653][T10738] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 287.201604][T10738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 03:00:24 executing program 2 (fault-call:3 fault-nth:7): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 287.209665][T10738] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:24 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100", 0x66, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:24 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x500}}, 0x14}}, 0x0) 03:00:24 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x32e0, 0xffffff7f}, 0x14}}, 0x0) 03:00:24 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x9, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 287.303760][T10764] FAULT_INJECTION: forcing a failure. [ 287.303760][T10764] name failslab, interval 1, probability 0, space 0, times 0 [ 287.306348][T10767] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 287.316440][T10764] CPU: 0 PID: 10764 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 287.316450][T10764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.344236][T10764] Call Trace: [ 287.345010][T10767] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 287.347517][T10764] dump_stack+0x1dd/0x24e [ 287.347531][T10764] ? devkmsg_release+0x11c/0x11c [ 287.364894][T10764] ? memset+0x1f/0x40 [ 287.368871][T10764] ? show_regs_print_info+0x12/0x12 [ 287.374003][T10767] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 287.374062][T10764] ? unwind_next_frame+0x1aa9/0x1f30 [ 287.382741][T10767] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 287.387043][T10764] should_fail+0x6fb/0x860 03:00:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x11000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:24 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 287.387053][T10764] ? setup_fault_attr+0x3d0/0x3d0 [ 287.387062][T10764] ? __alloc_skb+0x88/0x4d0 [ 287.387070][T10764] should_failslab+0x5/0x20 [ 287.387078][T10764] kmem_cache_alloc+0x36/0x270 [ 287.387089][T10764] __alloc_skb+0x88/0x4d0 [ 287.422601][T10764] ? arch_stack_walk+0xf8/0x140 [ 287.427427][T10764] alloc_skb_with_frags+0xb1/0x580 [ 287.432555][T10764] ? stack_trace_save+0x120/0x1f0 [ 287.437590][T10764] ? ipv4_link_failure+0x3fa/0x760 [ 287.442677][T10764] sock_alloc_send_pskb+0x86d/0xcb0 [ 287.447862][T10764] ? sock_kzfree_s+0x50/0x50 [ 287.452424][T10764] ? kmem_cache_alloc_trace+0xc3/0x290 [ 287.457882][T10764] ? ip_setup_cork+0x4fe/0x810 [ 287.462620][T10764] ? ip_append_data+0x155/0x1a0 [ 287.467441][T10764] ? icmp_push_reply+0x100/0x440 [ 287.472349][T10764] ? __icmp_send+0x1a50/0x2270 [ 287.477098][T10764] ? ipv4_link_failure+0x3fa/0x760 [ 287.482178][T10764] ? vti_tunnel_xmit+0x10c8/0x1350 [ 287.487270][T10764] ? xmit_one+0x239/0x480 [ 287.491595][T10764] ? __dev_queue_xmit+0x1935/0x2700 [ 287.496775][T10764] ? packet_sendmsg+0x4d2f/0x6780 [ 287.501772][T10764] ? ____sys_sendmsg+0x587/0x8d0 [ 287.506679][T10764] ? __sys_sendmsg+0x2c4/0x3b0 [ 287.511412][T10764] ? do_syscall_64+0xcb/0x150 [ 287.516061][T10764] __ip_append_data+0x1fcc/0x3220 [ 287.521058][T10764] ? icmp_err+0x280/0x280 [ 287.525358][T10764] ? ip_setup_cork+0x810/0x810 [ 287.530091][T10764] ? ip_setup_cork+0x46b/0x810 [ 287.534828][T10764] ip_append_data+0x12c/0x1a0 [ 287.539497][T10764] ? icmp_err+0x280/0x280 [ 287.543814][T10764] icmp_push_reply+0x100/0x440 [ 287.548549][T10764] __icmp_send+0x1a50/0x2270 [ 287.553125][T10764] ? icmp_out_count+0x90/0x90 [ 287.557776][T10764] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 287.562959][T10764] ? check_preemption_disabled+0x9e/0x330 [ 287.568664][T10764] ? __local_bh_enable_ip+0x48/0x70 [ 287.573833][T10764] ? rt_set_nexthop+0x48c/0x1140 [ 287.578750][T10764] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 287.584964][T10764] ? memset+0x1f/0x40 [ 287.588918][T10764] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 287.594534][T10764] ipv4_link_failure+0x3fa/0x760 [ 287.599466][T10764] ? ipv4_negative_advice+0x110/0x110 [ 287.604819][T10764] ? ipv4_negative_advice+0x110/0x110 [ 287.610173][T10764] vti_tunnel_xmit+0x10c8/0x1350 [ 287.615085][T10764] ? packet_rcv+0x139/0x1360 [ 287.619644][T10764] ? vti_tunnel_init+0x250/0x250 [ 287.624552][T10764] ? debug_smp_processor_id+0x20/0x20 [ 287.629893][T10764] xmit_one+0x239/0x480 [ 287.634022][T10764] __dev_queue_xmit+0x1935/0x2700 [ 287.639034][T10764] ? dev_queue_xmit+0x20/0x20 [ 287.643682][T10764] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 287.649640][T10764] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 287.655599][T10764] ? skb_put+0x114/0x1e0 [ 287.659830][T10764] packet_sendmsg+0x4d2f/0x6780 [ 287.664709][T10764] ? __rcu_read_lock+0x50/0x50 [ 287.669519][T10764] ? debug_smp_processor_id+0x20/0x20 [ 287.674888][T10764] ? stack_trace_save+0x1f0/0x1f0 [ 287.679886][T10764] ? __kernel_text_address+0x93/0x110 [ 287.685238][T10764] ? unwind_get_return_address+0x48/0x90 [ 287.690852][T10764] ? arch_stack_walk+0xf8/0x140 [ 287.695674][T10764] ? memset+0x1f/0x40 [ 287.699627][T10764] ? selinux_socket_sendmsg+0x11f/0x340 [ 287.705161][T10764] ? selinux_socket_accept+0x5b0/0x5b0 [ 287.710590][T10764] ? compat_packet_setsockopt+0x160/0x160 [ 287.716281][T10764] ? rw_copy_check_uvector+0x2b3/0x310 [ 287.721733][T10764] ? import_iovec+0x1bc/0x380 [ 287.726394][T10764] ? security_socket_sendmsg+0xad/0xc0 [ 287.731827][T10764] ? compat_packet_setsockopt+0x160/0x160 [ 287.737527][T10764] ____sys_sendmsg+0x587/0x8d0 [ 287.742277][T10764] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 287.747461][T10764] ? proc_fail_nth_read+0x1c0/0x1c0 [ 287.752633][T10764] __sys_sendmsg+0x2c4/0x3b0 [ 287.757196][T10764] ? ____sys_sendmsg+0x8d0/0x8d0 [ 287.762103][T10764] ? check_preemption_disabled+0x9e/0x330 [ 287.767811][T10764] ? fput_many+0x42/0x1a0 [ 287.772112][T10764] ? check_preemption_disabled+0x15a/0x330 [ 287.777893][T10764] do_syscall_64+0xcb/0x150 [ 287.782370][T10764] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.788241][T10764] RIP: 0033:0x45e219 [ 287.792133][T10764] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.811718][T10764] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.820102][T10764] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 287.828056][T10764] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 287.835997][T10764] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 287.844058][T10764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 03:00:25 executing program 2 (fault-call:3 fault-nth:8): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:25 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:25 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x600}}, 0x14}}, 0x0) [ 287.852002][T10764] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:25 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100", 0x66, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x12000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:25 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 287.923914][T10788] FAULT_INJECTION: forcing a failure. [ 287.923914][T10788] name failslab, interval 1, probability 0, space 0, times 0 [ 287.936573][T10788] CPU: 1 PID: 10788 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 287.946710][T10788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.956758][T10788] Call Trace: [ 287.960054][T10788] dump_stack+0x1dd/0x24e [ 287.964382][T10788] ? devkmsg_release+0x11c/0x11c [ 287.967859][T10791] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 287.969316][T10788] ? show_regs_print_info+0x12/0x12 [ 287.969332][T10788] should_fail+0x6fb/0x860 [ 287.986883][T10788] ? setup_fault_attr+0x3d0/0x3d0 [ 287.991909][T10788] ? alloc_skb_with_frags+0xb1/0x580 [ 287.997193][T10788] should_failslab+0x5/0x20 [ 287.999107][T10791] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 288.001687][T10788] __kmalloc_track_caller+0x5d/0x2c0 [ 288.001696][T10788] ? kmem_cache_alloc+0x1e0/0x270 [ 288.001711][T10788] ? alloc_skb_with_frags+0xb1/0x580 [ 288.013076][T10791] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 288.015104][T10788] __alloc_skb+0xd1/0x4d0 [ 288.015114][T10788] ? arch_stack_walk+0xf8/0x140 [ 288.015122][T10788] alloc_skb_with_frags+0xb1/0x580 [ 288.015131][T10788] ? stack_trace_save+0x120/0x1f0 [ 288.015138][T10788] ? ipv4_link_failure+0x3fa/0x760 [ 288.015157][T10788] sock_alloc_send_pskb+0x86d/0xcb0 [ 288.021560][T10791] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 288.025437][T10788] ? sock_kzfree_s+0x50/0x50 [ 288.025446][T10788] ? kmem_cache_alloc_trace+0xc3/0x290 [ 288.025453][T10788] ? ip_setup_cork+0x4fe/0x810 [ 288.025458][T10788] ? ip_append_data+0x155/0x1a0 [ 288.025471][T10788] ? icmp_push_reply+0x100/0x440 [ 288.095210][T10788] ? __icmp_send+0x1a50/0x2270 [ 288.099947][T10788] ? ipv4_link_failure+0x3fa/0x760 [ 288.105048][T10788] ? vti_tunnel_xmit+0x10c8/0x1350 [ 288.110144][T10788] ? xmit_one+0x239/0x480 [ 288.114443][T10788] ? __dev_queue_xmit+0x1935/0x2700 [ 288.119616][T10788] ? packet_sendmsg+0x4d2f/0x6780 [ 288.124613][T10788] ? ____sys_sendmsg+0x587/0x8d0 [ 288.129518][T10788] ? __sys_sendmsg+0x2c4/0x3b0 [ 288.134252][T10788] ? do_syscall_64+0xcb/0x150 [ 288.138905][T10788] __ip_append_data+0x1fcc/0x3220 [ 288.143903][T10788] ? icmp_err+0x280/0x280 [ 288.148204][T10788] ? ip_setup_cork+0x810/0x810 [ 288.152953][T10788] ? ip_setup_cork+0x46b/0x810 [ 288.157692][T10788] ip_append_data+0x12c/0x1a0 [ 288.162355][T10788] ? icmp_err+0x280/0x280 [ 288.166657][T10788] icmp_push_reply+0x100/0x440 [ 288.171392][T10788] __icmp_send+0x1a50/0x2270 [ 288.175955][T10788] ? icmp_out_count+0x90/0x90 [ 288.180609][T10788] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 288.185787][T10788] ? check_preemption_disabled+0x9e/0x330 [ 288.191480][T10788] ? __local_bh_enable_ip+0x48/0x70 [ 288.196649][T10788] ? rt_set_nexthop+0x48c/0x1140 [ 288.201564][T10788] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 288.207775][T10788] ? memset+0x1f/0x40 [ 288.211735][T10788] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 288.217337][T10788] ipv4_link_failure+0x3fa/0x760 [ 288.222261][T10788] ? ipv4_negative_advice+0x110/0x110 [ 288.227745][T10788] ? ipv4_negative_advice+0x110/0x110 [ 288.233100][T10788] vti_tunnel_xmit+0x10c8/0x1350 [ 288.238037][T10788] ? packet_rcv+0x139/0x1360 [ 288.242599][T10788] ? vti_tunnel_init+0x250/0x250 [ 288.247535][T10788] ? debug_smp_processor_id+0x20/0x20 [ 288.252903][T10788] xmit_one+0x239/0x480 [ 288.257045][T10788] __dev_queue_xmit+0x1935/0x2700 [ 288.262042][T10788] ? dev_queue_xmit+0x20/0x20 [ 288.266692][T10788] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 288.272663][T10788] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 288.278611][T10788] ? skb_put+0x114/0x1e0 [ 288.282823][T10788] packet_sendmsg+0x4d2f/0x6780 [ 288.287649][T10788] ? __rcu_read_lock+0x50/0x50 [ 288.292391][T10788] ? debug_smp_processor_id+0x20/0x20 [ 288.297739][T10788] ? stack_trace_save+0x1f0/0x1f0 [ 288.302740][T10788] ? __kernel_text_address+0x93/0x110 [ 288.308098][T10788] ? unwind_get_return_address+0x48/0x90 [ 288.313727][T10788] ? arch_stack_walk+0xf8/0x140 [ 288.318548][T10788] ? memset+0x1f/0x40 [ 288.322502][T10788] ? selinux_socket_sendmsg+0x11f/0x340 [ 288.328016][T10788] ? selinux_socket_accept+0x5b0/0x5b0 [ 288.333447][T10788] ? compat_packet_setsockopt+0x160/0x160 [ 288.339134][T10788] ? rw_copy_check_uvector+0x2b3/0x310 [ 288.344567][T10788] ? import_iovec+0x1bc/0x380 [ 288.349223][T10788] ? security_socket_sendmsg+0xad/0xc0 [ 288.354651][T10788] ? compat_packet_setsockopt+0x160/0x160 [ 288.360341][T10788] ____sys_sendmsg+0x587/0x8d0 [ 288.365077][T10788] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 288.370250][T10788] ? proc_fail_nth_read+0x1c0/0x1c0 [ 288.375416][T10788] __sys_sendmsg+0x2c4/0x3b0 [ 288.379995][T10788] ? ____sys_sendmsg+0x8d0/0x8d0 [ 288.384901][T10788] ? check_preemption_disabled+0x9e/0x330 [ 288.390590][T10788] ? fput_many+0x42/0x1a0 [ 288.394888][T10788] ? check_preemption_disabled+0x15a/0x330 [ 288.400663][T10788] do_syscall_64+0xcb/0x150 [ 288.405136][T10788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 288.411010][T10788] RIP: 0033:0x45e219 [ 288.414875][T10788] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.434448][T10788] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 288.442842][T10788] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 288.450787][T10788] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 288.458752][T10788] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 288.466716][T10788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 03:00:25 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x2}}, 0x14}}, 0x0) 03:00:25 executing program 2 (fault-call:3 fault-nth:9): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:25 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xa00}}, 0x14}}, 0x0) 03:00:25 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x10, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:25 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000001000000300000001000000", 0x68, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) [ 288.474657][T10788] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:25 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x11, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 288.545655][T10810] FAULT_INJECTION: forcing a failure. [ 288.545655][T10810] name failslab, interval 1, probability 0, space 0, times 0 [ 288.550282][T10811] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 288.558311][T10810] CPU: 0 PID: 10810 Comm: syz-executor.2 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 288.558320][T10810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.586107][T10810] Call Trace: [ 288.589396][T10810] dump_stack+0x1dd/0x24e 03:00:25 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x60, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 288.593721][T10810] ? devkmsg_release+0x11c/0x11c [ 288.598657][T10810] ? show_regs_print_info+0x12/0x12 [ 288.603851][T10810] ? skb_network_protocol+0x495/0x650 [ 288.606009][T10811] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 288.609229][T10810] ? __rcu_read_lock+0x50/0x50 [ 288.609244][T10810] should_fail+0x6fb/0x860 [ 288.626536][T10810] ? setup_fault_attr+0x3d0/0x3d0 [ 288.631673][T10810] ? stack_trace_save+0x1f0/0x1f0 [ 288.636697][T10810] ? skb_clone+0x1b2/0x370 [ 288.641109][T10810] should_failslab+0x5/0x20 [ 288.645610][T10810] kmem_cache_alloc+0x36/0x270 [ 288.650369][T10810] skb_clone+0x1b2/0x370 [ 288.654610][T10810] dev_queue_xmit_nit+0x279/0x9e0 [ 288.659722][T10810] ? debug_smp_processor_id+0x20/0x20 [ 288.665097][T10810] xmit_one+0x7e/0x480 [ 288.667648][T10811] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 288.669157][T10810] ? netdev_core_pick_tx+0xc5/0x2f0 [ 288.669166][T10810] __dev_queue_xmit+0x1935/0x2700 [ 288.669178][T10810] ? dev_queue_xmit+0x20/0x20 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x78, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x18000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x3}}, 0x14}}, 0x0) [ 288.684624][T10811] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 288.687059][T10810] ? ip_finish_output2+0x936/0x1810 [ 288.687067][T10810] ip_finish_output2+0xbdf/0x1810 [ 288.687078][T10810] ? ip_fragment+0x210/0x210 [ 288.714744][T10810] ? __ip_finish_output+0x4f1/0x720 [ 288.719916][T10810] ip_output+0x2f7/0x3a0 [ 288.724144][T10810] ? ip_finish_output+0x1d0/0x1d0 [ 288.729194][T10810] ? ip_mc_finish_output+0x3a0/0x3a0 [ 288.734456][T10810] ? icmp_push_reply+0x303/0x440 [ 288.739429][T10810] ip_push_pending_frames+0xf3/0x190 [ 288.744708][T10810] __icmp_send+0x1a50/0x2270 [ 288.749279][T10810] ? icmp_out_count+0x90/0x90 [ 288.753927][T10810] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 288.759100][T10810] ? check_preemption_disabled+0x9e/0x330 [ 288.764793][T10810] ? __local_bh_enable_ip+0x48/0x70 [ 288.769962][T10810] ? rt_set_nexthop+0x48c/0x1140 [ 288.774925][T10810] ? ip_route_output_key_hash_rcu+0x1189/0x21c0 [ 288.781141][T10810] ? memset+0x1f/0x40 [ 288.785096][T10810] ? xfrm_lookup_with_ifid+0x182f/0x2080 [ 288.790711][T10810] ipv4_link_failure+0x3fa/0x760 [ 288.795621][T10810] ? ipv4_negative_advice+0x110/0x110 [ 288.800965][T10810] ? ipv4_negative_advice+0x110/0x110 [ 288.806333][T10810] vti_tunnel_xmit+0x10c8/0x1350 [ 288.811245][T10810] ? packet_rcv+0x139/0x1360 [ 288.815805][T10810] ? vti_tunnel_init+0x250/0x250 [ 288.820713][T10810] ? debug_smp_processor_id+0x20/0x20 [ 288.826056][T10810] xmit_one+0x239/0x480 [ 288.830188][T10810] __dev_queue_xmit+0x1935/0x2700 [ 288.835193][T10810] ? dev_queue_xmit+0x20/0x20 [ 288.839853][T10810] ? skb_copy_datagram_from_iter+0x5c1/0x6b0 [ 288.845808][T10810] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 288.851760][T10810] ? skb_put+0x114/0x1e0 [ 288.855976][T10810] packet_sendmsg+0x4d2f/0x6780 [ 288.860804][T10810] ? __rcu_read_lock+0x50/0x50 [ 288.865539][T10810] ? debug_smp_processor_id+0x20/0x20 [ 288.870901][T10810] ? stack_trace_save+0x1f0/0x1f0 [ 288.875900][T10810] ? __kernel_text_address+0x93/0x110 [ 288.881244][T10810] ? unwind_get_return_address+0x48/0x90 [ 288.886864][T10810] ? arch_stack_walk+0xf8/0x140 [ 288.891690][T10810] ? memset+0x1f/0x40 [ 288.895643][T10810] ? selinux_socket_sendmsg+0x11f/0x340 [ 288.901159][T10810] ? selinux_socket_accept+0x5b0/0x5b0 [ 288.906588][T10810] ? compat_packet_setsockopt+0x160/0x160 [ 288.912279][T10810] ? rw_copy_check_uvector+0x2b3/0x310 [ 288.917725][T10810] ? import_iovec+0x1bc/0x380 [ 288.922372][T10810] ? security_socket_sendmsg+0xad/0xc0 [ 288.927800][T10810] ? compat_packet_setsockopt+0x160/0x160 [ 288.933506][T10810] ____sys_sendmsg+0x587/0x8d0 [ 288.938272][T10810] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 288.943501][T10810] ? proc_fail_nth_read+0x1c0/0x1c0 [ 288.948686][T10810] __sys_sendmsg+0x2c4/0x3b0 [ 288.953257][T10810] ? ____sys_sendmsg+0x8d0/0x8d0 [ 288.958225][T10810] ? check_preemption_disabled+0x9e/0x330 [ 288.963929][T10810] ? fput_many+0x42/0x1a0 [ 288.968234][T10810] ? check_preemption_disabled+0x15a/0x330 [ 288.974029][T10810] do_syscall_64+0xcb/0x150 [ 288.978528][T10810] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 288.984391][T10810] RIP: 0033:0x45e219 [ 288.988264][T10810] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.007847][T10810] RSP: 002b:00007fcbbf316c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 289.016240][T10810] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 289.024190][T10810] RDX: 0000000000000000 RSI: 0000000020001080 RDI: 0000000000000003 [ 289.032147][T10810] RBP: 00007fcbbf316ca0 R08: 0000000000000000 R09: 0000000000000000 03:00:26 executing program 2 (fault-call:3 fault-nth:10): r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xf00}}, 0x14}}, 0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfc, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 289.040089][T10810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 289.048034][T10810] R13: 00007ffdbbc7299f R14: 00007fcbbf3179c0 R15: 000000000119bf8c 03:00:26 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000001000000300000001000000", 0x68, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x1100}}, 0x14}}, 0x0) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x4}}, 0x14}}, 0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x220, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 289.179846][T10843] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 289.191146][T10843] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x300, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x8}}, 0x14}}, 0x0) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x1400}}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 289.220803][T10843] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.245757][T10843] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x500, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0000001000000300000001000000", 0x68, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x3000}}, 0x14}}, 0x0) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0xf}}, 0x14}}, 0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x5a0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x4000}}, 0x14}}, 0x0) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x11}}, 0x14}}, 0x0) [ 289.365005][T10887] F2FS-fs (loop0): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 289.395868][T10887] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x5c8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0x6000}}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x26000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 289.421844][T10887] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.446337][T10887] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x14}}, 0x14}}, 0x0) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x600, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xe000}}, 0x14}}, 0x0) 03:00:26 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2e050000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x700, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x60}}, 0x14}}, 0x0) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xe803}}, 0x14}}, 0x0) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 289.549355][T10931] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.565258][T10931] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 289.587834][T10931] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x900, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0xe0}}, 0x14}}, 0x0) 03:00:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f, {0x0, 0x0, 0xf401}}, 0x14}}, 0x0) 03:00:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 289.610810][T10931] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x18}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x2}}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x224}}, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80040000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x1100, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x3}}, 0x14}}, 0x0) [ 289.740312][T10970] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.750116][T10970] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 289.760558][T10970] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.775124][T10970] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x5c8}}, 0x0) 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, 'f2fs\x00'}}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x2002, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x4}}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x3f00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x8}}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x5cc}}, 0x0) [ 289.879723][T11004] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.908000][T11004] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0xf}}, 0x14}}, 0x0) [ 289.944685][T11004] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.980847][T11004] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf0ffffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x11, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x20000014}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x6000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x11}}, 0x14}}, 0x0) 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x7ffff000}}, 0x0) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x14, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x14}}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7800, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x80fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x30, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x60}}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0xfffffdef}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa005, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0xe0}}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xc805, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x2}, 0x0) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x60, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfc00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x3}, 0x0) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xff030000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x4}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfe80, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1f4, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x2}}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xff00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x6}, 0x0) [ 290.447696][T11115] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.478343][T11115] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x100000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f00, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 290.488873][T11115] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:27 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3e8, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x3}}, 0x14}}, 0x0) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf0ff7f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x8}, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x1000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:27 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x300}, 0x0) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) 03:00:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x8}}, 0x14}}, 0x0) [ 290.591541][T11147] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.631391][T11147] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 290.647778][T11147] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x2000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x301}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0xf}}, 0x14}}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x11}}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x2}, 0x0) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x3000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 290.757779][T11182] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.776232][T11182] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}]}) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x14}}, 0x14}}, 0x0) [ 290.810476][T11182] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x5000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x6000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x60}}, 0x14}}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4}, 0x0) [ 290.916466][T11220] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.942500][T11220] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 290.973068][T11220] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0xe0}}, 0x14}}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1400, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x5}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x300}}, 0x14}}, 0x0) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x8000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 291.090497][T11258] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 291.120827][T11258] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 291.144661][T11258] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}], [{@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>'}}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x9000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0xf00}}, 0x14}}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x1100}}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xa}, 0x0) 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}], [{@context={'context', 0x3d, 'root'}}]}) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x1400}}, 0x14}}, 0x0) [ 291.270238][T11298] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 291.278826][T11298] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 291.291253][T11298] F2FS-fs (loop0): Unrecognized mount option "euid>00000000000000000000" or missing value 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x11}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x4000}}, 0x14}}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x10000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.419894][T11317] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 291.437569][T11317] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 291.455413][T11317] F2FS-fs (loop0): invalid crc_offset: 0 [ 291.472177][T11317] F2FS-fs (loop0): invalid crc_offset: 0 [ 291.484470][T11317] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0x6000}}, 0x14}}, 0x0) 03:00:28 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x10000120, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x14}, 0x0) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f, {0x0, 0x0, 0xe000}}, 0x14}}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe803, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:28 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x30}, 0x0) 03:00:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x5c8}}, 0x0) 03:00:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:28 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x11000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.631962][T11363] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 291.659208][T11363] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x20010010, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.683319][T11363] F2FS-fs (loop0): invalid crc_offset: 0 [ 291.700510][T11363] F2FS-fs (loop0): invalid crc_offset: 0 [ 291.714795][T11363] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf401, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x5cc}}, 0x0) 03:00:29 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x60}, 0x0) 03:00:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x20020000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:29 executing program 0 (fault-call:2 fault-nth:0): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:29 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe0}, 0x0) 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x3f000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 291.844566][T11400] FAULT_INJECTION: forcing a failure. [ 291.844566][T11400] name failslab, interval 1, probability 0, space 0, times 0 [ 291.860189][T11400] CPU: 0 PID: 11400 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 291.870368][T11400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.880419][T11400] Call Trace: [ 291.883710][T11400] dump_stack+0x1dd/0x24e [ 291.888041][T11400] ? devkmsg_release+0x11c/0x11c [ 291.892978][T11400] ? show_regs_print_info+0x12/0x12 [ 291.898158][T11400] should_fail+0x6fb/0x860 [ 291.902553][T11400] ? setup_fault_attr+0x3d0/0x3d0 [ 291.907553][T11400] ? fput_many+0x42/0x1a0 [ 291.911865][T11400] ? check_preemption_disabled+0x15a/0x330 [ 291.917650][T11400] ? __se_sys_memfd_create+0xf1/0x380 [ 291.923021][T11400] should_failslab+0x5/0x20 [ 291.927507][T11400] __kmalloc+0x5f/0x2d0 [ 291.931741][T11400] ? __ia32_sys_read+0x80/0x80 [ 291.936476][T11400] ? strnlen_user+0x185/0x210 [ 291.941123][T11400] __se_sys_memfd_create+0xf1/0x380 [ 291.946295][T11400] do_syscall_64+0xcb/0x150 [ 291.950774][T11400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.956652][T11400] RIP: 0033:0x45e219 [ 291.960647][T11400] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.980221][T11400] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 03:00:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x20480, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x20000014}}, 0x0) 03:00:29 executing program 0 (fault-call:2 fault-nth:1): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 291.988601][T11400] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 291.996562][T11400] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 292.004504][T11400] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 292.012449][T11400] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 292.020392][T11400] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x40000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x7ffff000}}, 0x0) 03:00:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:29 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1f4}, 0x0) [ 292.085231][T11423] FAULT_INJECTION: forcing a failure. [ 292.085231][T11423] name failslab, interval 1, probability 0, space 0, times 0 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4120439c, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 292.126191][T11423] CPU: 1 PID: 11423 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 292.136368][T11423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.146416][T11423] Call Trace: [ 292.149739][T11423] dump_stack+0x1dd/0x24e [ 292.154067][T11423] ? devkmsg_release+0x11c/0x11c [ 292.159007][T11423] ? show_regs_print_info+0x12/0x12 [ 292.164197][T11423] ? __kasan_kmalloc+0x189/0x1c0 [ 292.169128][T11423] ? __kmalloc+0xe7/0x2d0 [ 292.173447][T11423] ? __se_sys_memfd_create+0xf1/0x380 [ 292.178810][T11423] ? do_syscall_64+0xcb/0x150 [ 292.183471][T11423] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 292.189618][T11423] should_fail+0x6fb/0x860 [ 292.194007][T11423] ? setup_fault_attr+0x3d0/0x3d0 [ 292.199060][T11423] ? expand_files+0xd1/0x980 [ 292.203626][T11423] ? shmem_alloc_inode+0x17/0x40 [ 292.208588][T11423] should_failslab+0x5/0x20 [ 292.213066][T11423] kmem_cache_alloc+0x36/0x270 [ 292.217810][T11423] ? shmem_match+0x150/0x150 [ 292.222375][T11423] shmem_alloc_inode+0x17/0x40 [ 292.227112][T11423] ? shmem_match+0x150/0x150 [ 292.231672][T11423] new_inode_pseudo+0x64/0x240 [ 292.236421][T11423] new_inode+0x25/0x1d0 [ 292.240556][T11423] shmem_get_inode+0x118/0x640 [ 292.245298][T11423] __shmem_file_setup+0x11e/0x270 [ 292.250294][T11423] __se_sys_memfd_create+0x1fa/0x380 [ 292.255550][T11423] do_syscall_64+0xcb/0x150 [ 292.260025][T11423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 292.265973][T11423] RIP: 0033:0x45e219 [ 292.269837][T11423] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.289416][T11423] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.297798][T11423] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 292.305742][T11423] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 292.313685][T11423] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 03:00:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:29 executing program 0 (fault-call:2 fault-nth:2): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0xfffffdef}}, 0x0) 03:00:29 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x300}, 0x0) [ 292.321629][T11423] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 292.329572][T11423] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x60000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x40000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:29 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3e8}, 0x0) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x2}, 0x0) [ 292.374313][T11448] FAULT_INJECTION: forcing a failure. [ 292.374313][T11448] name failslab, interval 1, probability 0, space 0, times 0 [ 292.413986][T11448] CPU: 1 PID: 11448 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x78000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 292.424161][T11448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.434208][T11448] Call Trace: [ 292.437499][T11448] dump_stack+0x1dd/0x24e [ 292.441831][T11448] ? devkmsg_release+0x11c/0x11c [ 292.446766][T11448] ? show_regs_print_info+0x12/0x12 [ 292.451967][T11448] should_fail+0x6fb/0x860 [ 292.456381][T11448] ? setup_fault_attr+0x3d0/0x3d0 [ 292.461417][T11448] ? make_kgid+0x228/0x3a0 [ 292.465823][T11448] ? security_inode_alloc+0x32/0x1f0 [ 292.471103][T11448] should_failslab+0x5/0x20 [ 292.475604][T11448] kmem_cache_alloc+0x36/0x270 [ 292.480376][T11448] security_inode_alloc+0x32/0x1f0 [ 292.485481][T11448] inode_init_always+0x37c/0x800 [ 292.490389][T11448] ? shmem_match+0x150/0x150 [ 292.494970][T11448] new_inode_pseudo+0x7b/0x240 [ 292.499715][T11448] new_inode+0x25/0x1d0 [ 292.503838][T11448] shmem_get_inode+0x118/0x640 [ 292.508568][T11448] __shmem_file_setup+0x11e/0x270 [ 292.513578][T11448] __se_sys_memfd_create+0x1fa/0x380 [ 292.518848][T11448] do_syscall_64+0xcb/0x150 [ 292.523320][T11448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 292.529177][T11448] RIP: 0033:0x45e219 [ 292.533055][T11448] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.552625][T11448] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.561026][T11448] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 03:00:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:29 executing program 0 (fault-call:2 fault-nth:3): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 292.568965][T11448] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 292.576904][T11448] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 292.584842][T11448] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 292.592780][T11448] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7ffff000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x6}, 0x0) [ 292.629856][T11472] FAULT_INJECTION: forcing a failure. [ 292.629856][T11472] name failslab, interval 1, probability 0, space 0, times 0 [ 292.668522][T11472] CPU: 1 PID: 11472 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x8dffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 292.678701][T11472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.688746][T11472] Call Trace: [ 292.692039][T11472] dump_stack+0x1dd/0x24e [ 292.696375][T11472] ? devkmsg_release+0x11c/0x11c [ 292.701312][T11472] ? show_regs_print_info+0x12/0x12 [ 292.706514][T11472] should_fail+0x6fb/0x860 [ 292.710931][T11472] ? setup_fault_attr+0x3d0/0x3d0 [ 292.715956][T11472] ? __d_alloc+0x2a/0x6b0 [ 292.720287][T11472] should_failslab+0x5/0x20 [ 292.724800][T11472] kmem_cache_alloc+0x36/0x270 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x9c432041, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xe00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 292.729563][T11472] ? security_inode_alloc+0x32/0x1f0 [ 292.734850][T11472] __d_alloc+0x2a/0x6b0 [ 292.739005][T11472] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 292.744725][T11472] d_alloc_pseudo+0x19/0x70 [ 292.749225][T11472] alloc_file_pseudo+0x13f/0x300 [ 292.754162][T11472] ? alloc_empty_file_noaccount+0x70/0x70 [ 292.759884][T11472] __shmem_file_setup+0x194/0x270 [ 292.764911][T11472] __se_sys_memfd_create+0x1fa/0x380 [ 292.770192][T11472] do_syscall_64+0xcb/0x150 [ 292.774694][T11472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 292.780580][T11472] RIP: 0033:0x45e219 [ 292.784466][T11472] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.804065][T11472] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.812469][T11472] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 292.820433][T11472] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 03:00:30 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x500}, 0x0) 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa0050000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:30 executing program 0 (fault-call:2 fault-nth:4): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x8}, 0x0) [ 292.828393][T11472] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 292.836341][T11472] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 292.844285][T11472] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xc8050000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 292.902021][T11512] FAULT_INJECTION: forcing a failure. [ 292.902021][T11512] name failslab, interval 1, probability 0, space 0, times 0 [ 292.914712][T11512] CPU: 1 PID: 11512 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 292.924858][T11512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.934927][T11512] Call Trace: [ 292.938217][T11512] dump_stack+0x1dd/0x24e [ 292.942558][T11512] ? devkmsg_release+0x11c/0x11c 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1100000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 292.947496][T11512] ? show_regs_print_info+0x12/0x12 [ 292.952692][T11512] ? memset+0x1f/0x40 [ 292.956677][T11512] should_fail+0x6fb/0x860 [ 292.961090][T11512] ? setup_fault_attr+0x3d0/0x3d0 [ 292.966110][T11512] ? arch_stack_walk+0xde/0x140 [ 292.970938][T11512] ? ebitmap_cmp+0x1c8/0x230 [ 292.975545][T11512] ? mls_compute_context_len+0x81b/0x850 [ 292.981149][T11512] ? context_struct_to_string+0x3de/0x820 [ 292.986889][T11512] should_failslab+0x5/0x20 [ 292.991366][T11512] __kmalloc+0x5f/0x2d0 [ 292.995581][T11512] context_struct_to_string+0x3de/0x820 [ 293.001102][T11512] ? security_bounded_transition+0x560/0x560 [ 293.007055][T11512] ? ebitmap_contains+0x6d8/0x780 [ 293.012052][T11512] ? hashtab_search+0x1bf/0x200 [ 293.016891][T11512] context_add_hash+0x13f/0x270 [ 293.021717][T11512] ? security_sid_to_context_inval+0x40/0x40 [ 293.027668][T11512] ? mls_context_isvalid+0x98/0x380 [ 293.032838][T11512] ? policydb_context_isvalid+0x1b6/0x400 [ 293.038530][T11512] security_compute_sid+0x11dc/0x1d50 [ 293.043880][T11512] ? security_transition_sid+0x90/0x90 [ 293.049458][T11512] ? __kasan_kmalloc+0x189/0x1c0 [ 293.054382][T11512] ? __kasan_kmalloc+0x129/0x1c0 [ 293.059294][T11512] ? kmem_cache_alloc+0x1e0/0x270 [ 293.064294][T11512] ? __d_alloc+0x2a/0x6b0 [ 293.068607][T11512] ? d_alloc_pseudo+0x19/0x70 [ 293.073305][T11512] ? alloc_file_pseudo+0x13f/0x300 [ 293.078419][T11512] ? __shmem_file_setup+0x194/0x270 [ 293.083589][T11512] ? __se_sys_memfd_create+0x1fa/0x380 [ 293.089025][T11512] ? do_syscall_64+0xcb/0x150 [ 293.093683][T11512] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.099807][T11512] ? _raw_spin_lock+0xa3/0x1b0 [ 293.104546][T11512] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 293.109935][T11512] security_transition_sid+0x78/0x90 [ 293.115198][T11512] inode_doinit_with_dentry+0x5e1/0x11d0 [ 293.120806][T11512] ? sb_finish_set_opts+0x7e0/0x7e0 [ 293.125973][T11512] ? __d_alloc+0x2a/0x6b0 [ 293.130274][T11512] ? kmem_cache_alloc+0x1e0/0x270 [ 293.135268][T11512] security_d_instantiate+0x90/0xf0 [ 293.140443][T11512] d_instantiate+0x51/0x90 [ 293.144844][T11512] alloc_file_pseudo+0x259/0x300 [ 293.149752][T11512] ? alloc_empty_file_noaccount+0x70/0x70 [ 293.155442][T11512] __shmem_file_setup+0x194/0x270 [ 293.160458][T11512] __se_sys_memfd_create+0x1fa/0x380 [ 293.165714][T11512] do_syscall_64+0xcb/0x150 [ 293.170198][T11512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.176059][T11512] RIP: 0033:0x45e219 [ 293.179923][T11512] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.199495][T11512] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 293.207879][T11512] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 293.215825][T11512] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 293.223767][T11512] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 293.231738][T11512] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 293.239691][T11512] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:30 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x600}, 0x0) 03:00:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x300}, 0x0) [ 293.250970][T11512] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 293.261619][T11512] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xe0ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 293.312625][T11512] F2FS-fs (loop0): invalid crc_offset: 0 [ 293.337194][T11512] F2FS-fs (loop0): invalid crc_offset: 0 [ 293.349665][T11512] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:30 executing program 0 (fault-call:2 fault-nth:5): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x301}, 0x0) 03:00:30 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xa00}, 0x0) 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xeffdffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1800000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:30 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf5ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:30 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf00}, 0x0) 03:00:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x2}, 0x0) 03:00:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 293.502713][T11563] FAULT_INJECTION: forcing a failure. [ 293.502713][T11563] name failslab, interval 1, probability 0, space 0, times 0 [ 293.564032][T11563] CPU: 1 PID: 11563 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 293.574217][T11563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.584289][T11563] Call Trace: [ 293.587584][T11563] dump_stack+0x1dd/0x24e [ 293.591906][T11563] ? devkmsg_release+0x11c/0x11c [ 293.596842][T11563] ? show_regs_print_info+0x12/0x12 [ 293.602045][T11563] ? _raw_spin_lock+0xa3/0x1b0 [ 293.606804][T11563] should_fail+0x6fb/0x860 03:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 293.611216][T11563] ? setup_fault_attr+0x3d0/0x3d0 [ 293.616239][T11563] ? _raw_spin_unlock+0x49/0x60 [ 293.621083][T11563] ? inode_doinit_with_dentry+0x73d/0x11d0 [ 293.626883][T11563] ? __alloc_file+0x26/0x390 [ 293.631470][T11563] should_failslab+0x5/0x20 [ 293.635966][T11563] kmem_cache_alloc+0x36/0x270 [ 293.640727][T11563] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 293.646085][T11563] __alloc_file+0x26/0x390 [ 293.650470][T11563] ? alloc_empty_file+0x49/0x1b0 [ 293.655412][T11563] alloc_empty_file+0xa9/0x1b0 [ 293.660142][T11563] alloc_file+0x57/0x4d0 [ 293.664353][T11563] alloc_file_pseudo+0x272/0x300 [ 293.669259][T11563] ? alloc_empty_file_noaccount+0x70/0x70 [ 293.674963][T11563] __shmem_file_setup+0x194/0x270 [ 293.679954][T11563] __se_sys_memfd_create+0x1fa/0x380 [ 293.685224][T11563] do_syscall_64+0xcb/0x150 [ 293.689697][T11563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.695557][T11563] RIP: 0033:0x45e219 [ 293.699421][T11563] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.718991][T11563] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 293.727381][T11563] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 293.735320][T11563] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 293.743260][T11563] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 293.751203][T11563] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 03:00:31 executing program 0 (fault-call:2 fault-nth:6): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfc000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3}, 0x0) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1100}, 0x0) [ 293.759144][T11563] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfe800000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2600000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4}, 0x0) [ 293.816815][T11602] FAULT_INJECTION: forcing a failure. [ 293.816815][T11602] name failslab, interval 1, probability 0, space 0, times 0 [ 293.864762][T11602] CPU: 0 PID: 11602 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 293.874940][T11602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.884985][T11602] Call Trace: [ 293.888272][T11602] dump_stack+0x1dd/0x24e [ 293.892597][T11602] ? devkmsg_release+0x11c/0x11c [ 293.897535][T11602] ? show_regs_print_info+0x12/0x12 [ 293.902734][T11602] should_fail+0x6fb/0x860 [ 293.907153][T11602] ? setup_fault_attr+0x3d0/0x3d0 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfe80ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1400}, 0x0) [ 293.912180][T11602] ? security_file_alloc+0x32/0x200 [ 293.917377][T11602] should_failslab+0x5/0x20 [ 293.921924][T11602] kmem_cache_alloc+0x36/0x270 [ 293.926689][T11602] security_file_alloc+0x32/0x200 [ 293.931710][T11602] __alloc_file+0xc6/0x390 [ 293.936116][T11602] alloc_empty_file+0xa9/0x1b0 [ 293.940858][T11602] alloc_file+0x57/0x4d0 [ 293.945171][T11602] alloc_file_pseudo+0x272/0x300 [ 293.950080][T11602] ? alloc_empty_file_noaccount+0x70/0x70 [ 293.955771][T11602] __shmem_file_setup+0x194/0x270 [ 293.960777][T11602] __se_sys_memfd_create+0x1fa/0x380 [ 293.966035][T11602] do_syscall_64+0xcb/0x150 [ 293.970518][T11602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.976385][T11602] RIP: 0033:0x45e219 [ 293.980257][T11602] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.999830][T11602] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 03:00:31 executing program 0 (fault-call:2 fault-nth:7): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2e05000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3000}, 0x0) [ 294.008212][T11602] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 294.016153][T11602] RDX: 0000000020000230 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 294.024109][T11602] RBP: 00000000004023c0 R08: 0000000020000230 R09: 0000000000000000 [ 294.032071][T11602] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000002 [ 294.040029][T11602] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8}, 0x0) 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfec0ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000}, 0x0) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 294.104908][T11640] FAULT_INJECTION: forcing a failure. [ 294.104908][T11640] name fail_page_alloc, interval 1, probability 0, space 0, times 1 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfeffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6000}, 0x0) [ 294.170161][T11640] CPU: 0 PID: 11640 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 294.180445][T11640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.190496][T11640] Call Trace: [ 294.193787][T11640] dump_stack+0x1dd/0x24e [ 294.198117][T11640] ? devkmsg_release+0x11c/0x11c [ 294.203064][T11640] ? show_regs_print_info+0x12/0x12 [ 294.208264][T11640] ? avc_has_perm_noaudit+0x37d/0x400 [ 294.213639][T11640] should_fail+0x6fb/0x860 [ 294.218052][T11640] ? setup_fault_attr+0x3d0/0x3d0 [ 294.223073][T11640] __alloc_pages_nodemask+0x1ee/0x7c0 [ 294.228444][T11640] ? selinux_syslog+0x120/0x120 [ 294.233289][T11640] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 294.238833][T11640] ? percpu_counter_add_batch+0x14d/0x170 [ 294.244548][T11640] shmem_getpage_gfp+0xef6/0x24d0 [ 294.249575][T11640] ? shmem_getpage+0xa0/0xa0 [ 294.254176][T11640] ? iov_iter_fault_in_readable+0x2d2/0x630 [ 294.260063][T11640] ? uuid_parse+0x3e0/0x3e0 [ 294.264562][T11640] ? avc_has_perm_noaudit+0x30c/0x400 [ 294.269922][T11640] shmem_write_begin+0xc5/0x190 [ 294.274773][T11640] generic_perform_write+0x2f7/0x590 [ 294.280031][T11640] ? grab_cache_page_write_begin+0x90/0x90 [ 294.285806][T11640] ? file_remove_privs+0x610/0x610 [ 294.290924][T11640] ? down_write+0xd8/0x150 [ 294.295308][T11640] __generic_file_write_iter+0x232/0x460 [ 294.300908][T11640] generic_file_write_iter+0x4a6/0x650 [ 294.306353][T11640] __vfs_write+0x59c/0x720 [ 294.310735][T11640] ? __kernel_write+0x340/0x340 [ 294.315555][T11640] ? check_preemption_disabled+0x9e/0x330 [ 294.321240][T11640] ? debug_smp_processor_id+0x20/0x20 [ 294.326579][T11640] vfs_write+0x217/0x4f0 [ 294.330790][T11640] __x64_sys_pwrite64+0x1af/0x240 [ 294.335782][T11640] ? ksys_pwrite64+0x1d0/0x1d0 [ 294.340513][T11640] ? __fd_install+0x118/0x260 [ 294.345162][T11640] do_syscall_64+0xcb/0x150 [ 294.349662][T11640] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.355524][T11640] RIP: 0033:0x417d77 [ 294.359389][T11640] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 294.378959][T11640] RSP: 002b:00007f4b3a1f9a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 294.387338][T11640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417d77 [ 294.395280][T11640] RDX: 0000000000000069 RSI: 0000000020000140 RDI: 0000000000000004 [ 294.403267][T11640] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 294.411206][T11640] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000002 [ 294.419149][T11640] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 294.435118][T11640] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 294.442932][T11640] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 294.451339][T11640] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 294.459124][T11640] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:00:31 executing program 0 (fault-call:2 fault-nth:8): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x14000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf}, 0x0) 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xff000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8004000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe000}, 0x0) 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffff0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x11}, 0x0) 03:00:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x30000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 294.564719][T11685] FAULT_INJECTION: forcing a failure. [ 294.564719][T11685] name failslab, interval 1, probability 0, space 0, times 0 [ 294.585216][T11685] CPU: 0 PID: 11685 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 294.595388][T11685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.605435][T11685] Call Trace: [ 294.608725][T11685] dump_stack+0x1dd/0x24e 03:00:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf0ffffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 294.613053][T11685] ? devkmsg_release+0x11c/0x11c [ 294.617989][T11685] ? generic_file_write_iter+0x522/0x650 [ 294.623620][T11685] ? show_regs_print_info+0x12/0x12 [ 294.628823][T11685] ? avc_has_perm_noaudit+0x400/0x400 [ 294.634193][T11685] should_fail+0x6fb/0x860 [ 294.638601][T11685] ? setup_fault_attr+0x3d0/0x3d0 [ 294.643615][T11685] ? __kernel_write+0x340/0x340 [ 294.648468][T11685] ? check_preemption_disabled+0x9e/0x330 [ 294.654178][T11685] ? getname_flags+0xb8/0x610 [ 294.658847][T11685] should_failslab+0x5/0x20 [ 294.663342][T11685] kmem_cache_alloc+0x36/0x270 [ 294.668090][T11685] getname_flags+0xb8/0x610 [ 294.672721][T11685] do_sys_open+0x33b/0x7b0 [ 294.677110][T11685] ? check_preemption_disabled+0x15a/0x330 [ 294.682899][T11685] ? file_open_root+0x450/0x450 [ 294.687730][T11685] ? __x64_sys_pwrite64+0x1d9/0x240 [ 294.692902][T11685] ? __fd_install+0x118/0x260 [ 294.697559][T11685] do_syscall_64+0xcb/0x150 [ 294.702040][T11685] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.707906][T11685] RIP: 0033:0x417d11 [ 294.711770][T11685] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 294.731346][T11685] RSP: 002b:00007f4b3a1f9a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 294.739730][T11685] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417d11 [ 294.747676][T11685] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4b3a1f9ad0 [ 294.755627][T11685] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 03:00:32 executing program 0 (fault-call:2 fault-nth:9): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe803}, 0x0) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x14}, 0x0) [ 294.763571][T11685] R10: 00000000002011e0 R11: 0000000000000293 R12: 0000000000000002 [ 294.771520][T11685] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x60}, 0x0) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffff80fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf401}, 0x0) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffc0fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x20480}, 0x0) 03:00:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfffffdef, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 294.859129][T11717] FAULT_INJECTION: forcing a failure. [ 294.859129][T11717] name failslab, interval 1, probability 0, space 0, times 0 [ 294.925757][T11717] CPU: 1 PID: 11717 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 294.935931][T11717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.945979][T11717] Call Trace: [ 294.949271][T11717] dump_stack+0x1dd/0x24e [ 294.953603][T11717] ? devkmsg_release+0x11c/0x11c [ 294.958541][T11717] ? show_regs_print_info+0x12/0x12 [ 294.963737][T11717] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 294.969799][T11717] should_fail+0x6fb/0x860 [ 294.974202][T11717] ? setup_fault_attr+0x3d0/0x3d0 [ 294.979238][T11717] ? check_preemption_disabled+0x9e/0x330 [ 294.984926][T11717] ? __rcu_read_lock+0x50/0x50 [ 294.989662][T11717] ? __alloc_file+0x26/0x390 [ 294.994226][T11717] should_failslab+0x5/0x20 [ 294.998701][T11717] kmem_cache_alloc+0x36/0x270 [ 295.003435][T11717] __alloc_file+0x26/0x390 [ 295.007823][T11717] ? alloc_empty_file+0x49/0x1b0 [ 295.012732][T11717] alloc_empty_file+0xa9/0x1b0 [ 295.017468][T11717] path_openat+0x11b/0x3c20 [ 295.021946][T11717] ? stack_trace_save+0x120/0x1f0 [ 295.026938][T11717] ? __rcu_read_lock+0x50/0x50 [ 295.031671][T11717] ? __kasan_kmalloc+0x189/0x1c0 [ 295.036578][T11717] ? do_filp_open+0x440/0x440 [ 295.041225][T11717] ? __kasan_kmalloc+0x129/0x1c0 [ 295.046133][T11717] ? kmem_cache_alloc+0x1e0/0x270 [ 295.051142][T11717] ? getname_flags+0xb8/0x610 [ 295.055795][T11717] ? do_sys_open+0x33b/0x7b0 [ 295.060363][T11717] ? do_syscall_64+0xcb/0x150 [ 295.065025][T11717] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.071102][T11717] do_filp_open+0x20a/0x440 [ 295.075592][T11717] ? vfs_tmpfile+0x210/0x210 [ 295.080160][T11717] ? _raw_spin_unlock+0x49/0x60 [ 295.084984][T11717] ? __alloc_fd+0x4e8/0x590 [ 295.089461][T11717] do_sys_open+0x380/0x7b0 [ 295.093851][T11717] ? check_preemption_disabled+0x15a/0x330 [ 295.099628][T11717] ? file_open_root+0x450/0x450 [ 295.104452][T11717] ? __x64_sys_pwrite64+0x1d9/0x240 [ 295.110000][T11717] ? __fd_install+0x118/0x260 [ 295.114661][T11717] do_syscall_64+0xcb/0x150 [ 295.119152][T11717] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.125039][T11717] RIP: 0033:0x417d11 [ 295.128908][T11717] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 295.148485][T11717] RSP: 002b:00007f4b3a1f9a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 295.156866][T11717] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417d11 [ 295.164810][T11717] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4b3a1f9ad0 03:00:32 executing program 0 (fault-call:2 fault-nth:10): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x34000}, 0x0) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe0}, 0x0) 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 295.172760][T11717] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 295.180708][T11717] R10: 00000000002011e0 R11: 0000000000000293 R12: 0000000000000002 [ 295.188655][T11717] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffff8d, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x80040200, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x300}, 0x0) 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xff03000000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 295.245886][T11755] FAULT_INJECTION: forcing a failure. [ 295.245886][T11755] name failslab, interval 1, probability 0, space 0, times 0 [ 295.279608][T11755] CPU: 1 PID: 11755 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 295.289784][T11755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.299829][T11755] Call Trace: [ 295.303123][T11755] dump_stack+0x1dd/0x24e [ 295.307450][T11755] ? devkmsg_release+0x11c/0x11c [ 295.312385][T11755] ? show_regs_print_info+0x12/0x12 [ 295.317580][T11755] should_fail+0x6fb/0x860 [ 295.322000][T11755] ? setup_fault_attr+0x3d0/0x3d0 [ 295.327019][T11755] ? security_file_alloc+0x32/0x200 [ 295.332215][T11755] should_failslab+0x5/0x20 [ 295.336716][T11755] kmem_cache_alloc+0x36/0x270 [ 295.341485][T11755] security_file_alloc+0x32/0x200 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffffe0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfffffff5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 295.346504][T11755] __alloc_file+0xc6/0x390 [ 295.350919][T11755] alloc_empty_file+0xa9/0x1b0 [ 295.355676][T11755] path_openat+0x11b/0x3c20 [ 295.360175][T11755] ? stack_trace_save+0x120/0x1f0 [ 295.365191][T11755] ? __rcu_read_lock+0x50/0x50 [ 295.369955][T11755] ? __kasan_kmalloc+0x189/0x1c0 [ 295.374884][T11755] ? do_filp_open+0x440/0x440 [ 295.379555][T11755] ? __kasan_kmalloc+0x129/0x1c0 [ 295.384485][T11755] ? kmem_cache_alloc+0x1e0/0x270 [ 295.389499][T11755] ? getname_flags+0xb8/0x610 [ 295.394170][T11755] ? do_sys_open+0x33b/0x7b0 [ 295.398749][T11755] ? do_syscall_64+0xcb/0x150 [ 295.403418][T11755] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.409474][T11755] do_filp_open+0x20a/0x440 [ 295.413950][T11755] ? vfs_tmpfile+0x210/0x210 [ 295.418536][T11755] ? _raw_spin_unlock+0x49/0x60 [ 295.423365][T11755] ? __alloc_fd+0x4e8/0x590 [ 295.427842][T11755] do_sys_open+0x380/0x7b0 [ 295.432248][T11755] ? check_preemption_disabled+0x15a/0x330 [ 295.438040][T11755] ? file_open_root+0x450/0x450 [ 295.443114][T11755] ? __x64_sys_pwrite64+0x1d9/0x240 [ 295.448294][T11755] ? __fd_install+0x118/0x260 [ 295.452945][T11755] do_syscall_64+0xcb/0x150 [ 295.457427][T11755] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.463291][T11755] RIP: 0033:0x417d11 [ 295.467174][T11755] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 295.486750][T11755] RSP: 002b:00007f4b3a1f9a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 03:00:32 executing program 0 (fault-call:2 fault-nth:11): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:32 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x40000}, 0x0) 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f0000000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe0000000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf00}, 0x0) [ 295.495133][T11755] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417d11 [ 295.503088][T11755] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4b3a1f9ad0 [ 295.511032][T11755] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 295.518977][T11755] R10: 00000000002011e0 R11: 0000000000000293 R12: 0000000000000002 [ 295.526918][T11755] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:32 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x400300}, 0x0) 03:00:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1100}, 0x0) [ 295.597736][T11794] FAULT_INJECTION: forcing a failure. [ 295.597736][T11794] name failslab, interval 1, probability 0, space 0, times 0 [ 295.613024][T11794] CPU: 0 PID: 11794 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 295.623191][T11794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.633234][T11794] Call Trace: [ 295.636509][T11794] dump_stack+0x1dd/0x24e [ 295.640817][T11794] ? devkmsg_release+0x11c/0x11c [ 295.645758][T11794] ? show_regs_print_info+0x12/0x12 [ 295.650930][T11794] should_fail+0x6fb/0x860 [ 295.655345][T11794] ? setup_fault_attr+0x3d0/0x3d0 [ 295.660375][T11794] ? refcount_add_checked+0x50/0x50 [ 295.665543][T11794] ? mutex_lock+0xa6/0x110 [ 295.669928][T11794] ? __module_put_and_exit+0x20/0x20 [ 295.675215][T11794] ? __kthread_create_on_node+0x128/0x430 [ 295.680901][T11794] should_failslab+0x5/0x20 [ 295.685376][T11794] kmem_cache_alloc_trace+0x39/0x290 [ 295.690630][T11794] ? loop_set_status_from_info+0x720/0x720 [ 295.696402][T11794] ? loop_set_status_from_info+0x720/0x720 [ 295.702179][T11794] __kthread_create_on_node+0x128/0x430 [ 295.707698][T11794] ? kthread_create_on_node+0x120/0x120 [ 295.713222][T11794] ? _raw_spin_unlock+0x49/0x60 [ 295.718043][T11794] ? bd_start_claiming+0x47c/0x590 [ 295.723124][T11794] ? loop_set_status_from_info+0x720/0x720 [ 295.728903][T11794] kthread_create_on_node+0xda/0x120 [ 295.734190][T11794] ? tsk_fork_get_node+0x10/0x10 [ 295.739105][T11794] ? loop_set_status_from_info+0x2c6/0x720 [ 295.744880][T11794] ? memcpy+0x38/0x50 [ 295.748831][T11794] ? memset+0x1f/0x40 [ 295.752789][T11794] loop_configure+0x7c9/0x1380 [ 295.757530][T11794] ? arch_stack_walk+0xde/0x140 [ 295.762354][T11794] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 295.768307][T11794] ? arch_stack_walk+0xde/0x140 [ 295.773130][T11794] lo_ioctl+0x820/0x23b0 [ 295.777454][T11794] ? memset+0x1f/0x40 [ 295.781409][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.786661][T11794] ? lo_release+0x1e0/0x1e0 [ 295.791136][T11794] ? arch_stack_walk+0xde/0x140 [ 295.795957][T11794] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 295.801906][T11794] ? stack_trace_save+0x1f0/0x1f0 [ 295.806902][T11794] ? preempt_count_add+0x66/0x150 [ 295.811897][T11794] ? memset+0x1f/0x40 [ 295.815852][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.821105][T11794] ? arch_stack_walk+0xde/0x140 [ 295.825926][T11794] ? memset+0x1f/0x40 [ 295.829880][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.835150][T11794] ? memset+0x1f/0x40 [ 295.839139][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.844425][T11794] ? arch_stack_walk+0xde/0x140 [ 295.849313][T11794] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 295.855266][T11794] ? preempt_count_add+0x66/0x150 [ 295.860266][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.865526][T11794] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.871584][T11794] ? check_preemption_disabled+0x9e/0x330 [ 295.877277][T11794] ? __rcu_read_lock+0x50/0x50 [ 295.882012][T11794] ? debug_smp_processor_id+0x20/0x20 [ 295.887358][T11794] ? is_bpf_text_address+0x290/0x2b0 [ 295.892613][T11794] ? stack_trace_save+0x1f0/0x1f0 [ 295.897608][T11794] ? __kernel_text_address+0x93/0x110 [ 295.902964][T11794] ? unwind_get_return_address+0x48/0x90 [ 295.908651][T11794] ? __rcu_read_lock+0x50/0x50 [ 295.913389][T11794] ? arch_stack_walk+0xf8/0x140 [ 295.918221][T11794] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 295.924391][T11794] ? refcount_add_checked+0x50/0x50 [ 295.929587][T11794] ? mutex_lock+0xa6/0x110 [ 295.933990][T11794] ? __module_put_and_exit+0x20/0x20 [ 295.939251][T11794] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 295.945392][T11794] ? arch_stack_walk+0xde/0x140 [ 295.950222][T11794] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 295.956186][T11794] ? preempt_count_add+0x66/0x150 [ 295.961186][T11794] ? unwind_next_frame+0x1aa9/0x1f30 [ 295.966453][T11794] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.972490][T11794] ? check_preemption_disabled+0x9e/0x330 [ 295.978203][T11794] ? __rcu_read_lock+0x50/0x50 [ 295.982938][T11794] ? debug_smp_processor_id+0x20/0x20 [ 295.988279][T11794] ? lo_release+0x1e0/0x1e0 [ 295.992754][T11794] blkdev_ioctl+0x8f7/0x2ce0 [ 295.997319][T11794] ? __kernel_text_address+0x93/0x110 [ 296.002663][T11794] ? unwind_get_return_address+0x48/0x90 [ 296.008268][T11794] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 296.013523][T11794] ? arch_stack_walk+0xf8/0x140 [ 296.018370][T11794] ? __rcu_read_lock+0x50/0x50 [ 296.023105][T11794] ? check_preemption_disabled+0x15a/0x330 [ 296.028884][T11794] ? avc_has_extended_perms+0x72a/0x1140 [ 296.034486][T11794] ? avc_has_extended_perms+0xb64/0x1140 [ 296.040130][T11794] ? avc_ss_reset+0x3a0/0x3a0 [ 296.044781][T11794] ? slab_free_freelist_hook+0xd0/0x150 [ 296.050308][T11794] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.056352][T11794] block_ioctl+0xb6/0xf0 [ 296.060569][T11794] ? blkdev_iopoll+0xf0/0xf0 [ 296.065140][T11794] do_vfs_ioctl+0x769/0x1720 [ 296.069703][T11794] ? selinux_file_ioctl+0x72f/0x990 [ 296.074873][T11794] ? ioctl_preallocate+0x250/0x250 [ 296.079960][T11794] ? __fget+0x37c/0x3c0 [ 296.084106][T11794] ? fget_many+0x20/0x20 [ 296.088322][T11794] ? debug_smp_processor_id+0x20/0x20 [ 296.093698][T11794] ? __x64_sys_pwrite64+0x1d9/0x240 [ 296.098889][T11794] ? security_file_ioctl+0xad/0xc0 [ 296.103980][T11794] __x64_sys_ioctl+0xd4/0x110 [ 296.109049][T11794] do_syscall_64+0xcb/0x150 [ 296.113538][T11794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.119411][T11794] RIP: 0033:0x45e087 [ 296.123280][T11794] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:00:33 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7ffffffff000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:33 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xe8030000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 296.142959][T11794] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.151344][T11794] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 296.159286][T11794] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.167230][T11794] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 296.175184][T11794] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 296.183134][T11794] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:33 executing program 0 (fault-call:2 fault-nth:12): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:33 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:33 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1000000}, 0x0) 03:00:33 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1400}, 0x0) 03:00:33 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xf4010000, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 296.286528][T11814] FAULT_INJECTION: forcing a failure. [ 296.286528][T11814] name failslab, interval 1, probability 0, space 0, times 0 [ 296.309870][T11814] CPU: 0 PID: 11814 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 296.320044][T11814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.330085][T11814] Call Trace: [ 296.333359][T11814] dump_stack+0x1dd/0x24e [ 296.337663][T11814] ? devkmsg_release+0x11c/0x11c [ 296.342592][T11814] ? show_regs_print_info+0x12/0x12 [ 296.347762][T11814] should_fail+0x6fb/0x860 [ 296.352150][T11814] ? setup_fault_attr+0x3d0/0x3d0 [ 296.357146][T11814] ? refcount_add_checked+0x50/0x50 [ 296.362315][T11814] ? mutex_lock+0xa6/0x110 [ 296.366700][T11814] ? __module_put_and_exit+0x20/0x20 [ 296.371958][T11814] ? __kthread_create_on_node+0x128/0x430 [ 296.377644][T11814] should_failslab+0x5/0x20 [ 296.382115][T11814] kmem_cache_alloc_trace+0x39/0x290 [ 296.387371][T11814] ? loop_set_status_from_info+0x720/0x720 [ 296.393145][T11814] ? loop_set_status_from_info+0x720/0x720 [ 296.398922][T11814] __kthread_create_on_node+0x128/0x430 [ 296.404462][T11814] ? kthread_create_on_node+0x120/0x120 [ 296.409978][T11814] ? _raw_spin_unlock+0x49/0x60 [ 296.414798][T11814] ? bd_start_claiming+0x47c/0x590 [ 296.419878][T11814] ? loop_set_status_from_info+0x720/0x720 [ 296.425683][T11814] kthread_create_on_node+0xda/0x120 [ 296.430943][T11814] ? tsk_fork_get_node+0x10/0x10 [ 296.435938][T11814] ? loop_set_status_from_info+0x2c6/0x720 [ 296.441715][T11814] ? memcpy+0x38/0x50 [ 296.445666][T11814] ? memset+0x1f/0x40 [ 296.449637][T11814] loop_configure+0x7c9/0x1380 [ 296.454374][T11814] ? arch_stack_walk+0xde/0x140 [ 296.459196][T11814] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 296.465147][T11814] ? arch_stack_walk+0xde/0x140 [ 296.469984][T11814] lo_ioctl+0x820/0x23b0 [ 296.474197][T11814] ? memset+0x1f/0x40 [ 296.478157][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.483414][T11814] ? lo_release+0x1e0/0x1e0 [ 296.487890][T11814] ? arch_stack_walk+0xde/0x140 [ 296.492710][T11814] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 296.498658][T11814] ? stack_trace_save+0x1f0/0x1f0 [ 296.503650][T11814] ? preempt_count_add+0x66/0x150 [ 296.508643][T11814] ? memset+0x1f/0x40 [ 296.512598][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.517858][T11814] ? arch_stack_walk+0xde/0x140 [ 296.522676][T11814] ? memset+0x1f/0x40 [ 296.526639][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.531894][T11814] ? memset+0x1f/0x40 [ 296.535845][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.541098][T11814] ? arch_stack_walk+0xde/0x140 [ 296.545919][T11814] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 296.551870][T11814] ? preempt_count_add+0x66/0x150 [ 296.556866][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.562132][T11814] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.568180][T11814] ? check_preemption_disabled+0x9e/0x330 [ 296.573870][T11814] ? __rcu_read_lock+0x50/0x50 [ 296.578604][T11814] ? debug_smp_processor_id+0x20/0x20 [ 296.583951][T11814] ? is_bpf_text_address+0x290/0x2b0 [ 296.589209][T11814] ? stack_trace_save+0x1f0/0x1f0 [ 296.594211][T11814] ? __kernel_text_address+0x93/0x110 [ 296.599552][T11814] ? unwind_get_return_address+0x48/0x90 [ 296.605163][T11814] ? __rcu_read_lock+0x50/0x50 [ 296.609911][T11814] ? arch_stack_walk+0xf8/0x140 [ 296.614731][T11814] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 296.620851][T11814] ? refcount_add_checked+0x50/0x50 [ 296.626021][T11814] ? mutex_lock+0xa6/0x110 [ 296.630427][T11814] ? __module_put_and_exit+0x20/0x20 [ 296.635682][T11814] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 296.641811][T11814] ? arch_stack_walk+0xde/0x140 [ 296.646633][T11814] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 296.652581][T11814] ? preempt_count_add+0x66/0x150 [ 296.657573][T11814] ? unwind_next_frame+0x1aa9/0x1f30 [ 296.662837][T11814] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.668874][T11814] ? check_preemption_disabled+0x9e/0x330 [ 296.674563][T11814] ? __rcu_read_lock+0x50/0x50 [ 296.679312][T11814] ? debug_smp_processor_id+0x20/0x20 [ 296.684657][T11814] ? lo_release+0x1e0/0x1e0 [ 296.689147][T11814] blkdev_ioctl+0x8f7/0x2ce0 [ 296.693709][T11814] ? __kernel_text_address+0x93/0x110 [ 296.699072][T11814] ? unwind_get_return_address+0x48/0x90 [ 296.704778][T11814] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 296.710041][T11814] ? arch_stack_walk+0xf8/0x140 [ 296.714864][T11814] ? __rcu_read_lock+0x50/0x50 [ 296.719596][T11814] ? check_preemption_disabled+0x15a/0x330 [ 296.725373][T11814] ? avc_has_extended_perms+0x72a/0x1140 [ 296.730980][T11814] ? avc_has_extended_perms+0xb64/0x1140 [ 296.736594][T11814] ? avc_ss_reset+0x3a0/0x3a0 [ 296.741245][T11814] ? slab_free_freelist_hook+0xd0/0x150 [ 296.746760][T11814] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.752801][T11814] block_ioctl+0xb6/0xf0 [ 296.757013][T11814] ? blkdev_iopoll+0xf0/0xf0 [ 296.761574][T11814] do_vfs_ioctl+0x769/0x1720 [ 296.766135][T11814] ? selinux_file_ioctl+0x72f/0x990 [ 296.771301][T11814] ? ioctl_preallocate+0x250/0x250 [ 296.776382][T11814] ? __fget+0x37c/0x3c0 [ 296.780532][T11814] ? fget_many+0x20/0x20 [ 296.784765][T11814] ? debug_smp_processor_id+0x20/0x20 [ 296.790124][T11814] ? __x64_sys_pwrite64+0x1d9/0x240 [ 296.795295][T11814] ? security_file_ioctl+0xad/0xc0 [ 296.800380][T11814] __x64_sys_ioctl+0xd4/0x110 [ 296.805041][T11814] do_syscall_64+0xcb/0x150 [ 296.809517][T11814] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.815379][T11814] RIP: 0033:0x45e087 [ 296.819257][T11814] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:00:34 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x2000000}, 0x0) 03:00:34 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x10000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xfdffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:34 executing program 0 (fault-call:2 fault-nth:13): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000}, 0x0) [ 296.838832][T11814] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.847213][T11814] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 296.855158][T11814] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.863102][T11814] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 296.871046][T11814] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 296.879028][T11814] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:34 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf0ff7f00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never', 0x22}]}) 03:00:34 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf0ffffff7f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:34 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3000000}, 0x0) [ 296.962022][T11837] FAULT_INJECTION: forcing a failure. [ 296.962022][T11837] name failslab, interval 1, probability 0, space 0, times 0 [ 296.975798][T11837] CPU: 0 PID: 11837 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 296.986012][T11837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.996046][T11837] Call Trace: [ 296.999317][T11837] dump_stack+0x1dd/0x24e [ 297.003623][T11837] ? devkmsg_release+0x11c/0x11c [ 297.008536][T11837] ? show_regs_print_info+0x12/0x12 [ 297.013706][T11837] ? mutex_lock+0xa6/0x110 [ 297.018096][T11837] ? mutex_trylock+0xb0/0xb0 [ 297.022656][T11837] ? idr_get_free+0x6de/0x880 [ 297.027303][T11837] should_fail+0x6fb/0x860 [ 297.031691][T11837] ? setup_fault_attr+0x3d0/0x3d0 [ 297.036683][T11837] ? selinux_kernfs_init_security+0x1a7/0x810 [ 297.042718][T11837] ? __kernfs_new_node+0xdb/0x6e0 [ 297.047714][T11837] should_failslab+0x5/0x20 [ 297.052186][T11837] kmem_cache_alloc+0x36/0x270 [ 297.056926][T11837] __kernfs_new_node+0xdb/0x6e0 [ 297.061761][T11837] ? kernfs_new_node+0x160/0x160 [ 297.066668][T11837] ? security_kernfs_init_security+0x9a/0xb0 [ 297.072618][T11837] ? mutex_lock+0xa6/0x110 [ 297.077014][T11837] ? mutex_trylock+0xb0/0xb0 [ 297.081600][T11837] kernfs_new_node+0x95/0x160 [ 297.086256][T11837] __kernfs_create_file+0x45/0x260 [ 297.091363][T11837] sysfs_add_file_mode_ns+0x293/0x340 [ 297.096776][T11837] internal_create_group+0x571/0xf50 [ 297.102084][T11837] ? sysfs_create_group+0x20/0x20 [ 297.107134][T11837] ? __loop_update_dio+0x23d/0x580 [ 297.112221][T11837] loop_configure+0xdd7/0x1380 [ 297.116958][T11837] lo_ioctl+0x820/0x23b0 [ 297.121174][T11837] ? memset+0x1f/0x40 [ 297.125133][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.130395][T11837] ? lo_release+0x1e0/0x1e0 [ 297.134878][T11837] ? arch_stack_walk+0xde/0x140 [ 297.139709][T11837] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 297.145678][T11837] ? stack_trace_save+0x1f0/0x1f0 [ 297.150708][T11837] ? preempt_count_add+0x66/0x150 [ 297.155707][T11837] ? memset+0x1f/0x40 [ 297.159665][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.164928][T11837] ? arch_stack_walk+0xde/0x140 [ 297.169765][T11837] ? memset+0x1f/0x40 [ 297.173737][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.179016][T11837] ? memset+0x1f/0x40 [ 297.182970][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.188260][T11837] ? arch_stack_walk+0xde/0x140 [ 297.193101][T11837] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 297.199053][T11837] ? preempt_count_add+0x66/0x150 [ 297.204050][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.209313][T11837] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.215352][T11837] ? check_preemption_disabled+0x9e/0x330 [ 297.221044][T11837] ? __rcu_read_lock+0x50/0x50 [ 297.225779][T11837] ? debug_smp_processor_id+0x20/0x20 [ 297.231138][T11837] ? is_bpf_text_address+0x290/0x2b0 [ 297.236414][T11837] ? stack_trace_save+0x1f0/0x1f0 [ 297.241419][T11837] ? __kernel_text_address+0x93/0x110 [ 297.246768][T11837] ? unwind_get_return_address+0x48/0x90 [ 297.252434][T11837] ? __rcu_read_lock+0x50/0x50 [ 297.257194][T11837] ? arch_stack_walk+0xf8/0x140 [ 297.262023][T11837] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 297.268150][T11837] ? refcount_add_checked+0x50/0x50 [ 297.273321][T11837] ? mutex_lock+0xa6/0x110 [ 297.277710][T11837] ? __module_put_and_exit+0x20/0x20 [ 297.282968][T11837] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 297.289102][T11837] ? arch_stack_walk+0xde/0x140 [ 297.293929][T11837] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 297.299881][T11837] ? preempt_count_add+0x66/0x150 [ 297.304908][T11837] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.310169][T11837] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.316208][T11837] ? check_preemption_disabled+0x9e/0x330 [ 297.321902][T11837] ? __rcu_read_lock+0x50/0x50 [ 297.326659][T11837] ? debug_smp_processor_id+0x20/0x20 [ 297.332006][T11837] ? lo_release+0x1e0/0x1e0 [ 297.336480][T11837] blkdev_ioctl+0x8f7/0x2ce0 [ 297.341044][T11837] ? __kernel_text_address+0x93/0x110 [ 297.346387][T11837] ? unwind_get_return_address+0x48/0x90 [ 297.351990][T11837] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 297.357245][T11837] ? arch_stack_walk+0xf8/0x140 [ 297.362064][T11837] ? __rcu_read_lock+0x50/0x50 [ 297.366810][T11837] ? check_preemption_disabled+0x15a/0x330 [ 297.372585][T11837] ? avc_has_extended_perms+0x72a/0x1140 [ 297.378189][T11837] ? avc_has_extended_perms+0xb64/0x1140 [ 297.383796][T11837] ? avc_ss_reset+0x3a0/0x3a0 [ 297.388473][T11837] ? slab_free_freelist_hook+0xd0/0x150 [ 297.393991][T11837] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.400035][T11837] block_ioctl+0xb6/0xf0 [ 297.404304][T11837] ? blkdev_iopoll+0xf0/0xf0 [ 297.408872][T11837] do_vfs_ioctl+0x769/0x1720 [ 297.413436][T11837] ? selinux_file_ioctl+0x72f/0x990 [ 297.418606][T11837] ? ioctl_preallocate+0x250/0x250 [ 297.423689][T11837] ? __fget+0x37c/0x3c0 [ 297.427827][T11837] ? fget_many+0x20/0x20 [ 297.432057][T11837] ? debug_smp_processor_id+0x20/0x20 [ 297.437406][T11837] ? __x64_sys_pwrite64+0x1d9/0x240 [ 297.442579][T11837] ? security_file_ioctl+0xad/0xc0 [ 297.447677][T11837] __x64_sys_ioctl+0xd4/0x110 [ 297.452329][T11837] do_syscall_64+0xcb/0x150 [ 297.456808][T11837] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.462670][T11837] RIP: 0033:0x45e087 [ 297.466535][T11837] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.486127][T11837] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.494508][T11837] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 297.502454][T11837] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:00:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xfeffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6000}, 0x0) [ 297.510397][T11837] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 297.518338][T11837] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 297.526280][T11837] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 297.553672][T11837] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:34 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never', 0x34}]}) 03:00:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:34 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000000}, 0x0) [ 297.598030][T11851] tmpfs: Bad value for 'huge' [ 297.602952][T11837] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 297.626719][T11837] F2FS-fs (loop0): invalid crc_offset: 0 [ 297.642680][T11837] F2FS-fs (loop0): invalid crc_offset: 0 [ 297.649931][T11864] tmpfs: Bad value for 'huge' [ 297.659416][T11837] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:35 executing program 0 (fault-call:2 fault-nth:14): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:35 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe000}, 0x0) 03:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:35 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xfffffffd, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:35 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x5000000}, 0x0) 03:00:35 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x2}) 03:00:35 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6000000}, 0x0) [ 297.793126][T11891] FAULT_INJECTION: forcing a failure. [ 297.793126][T11891] name failslab, interval 1, probability 0, space 0, times 0 [ 297.806044][T11891] CPU: 0 PID: 11891 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 297.816179][T11891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.826253][T11891] Call Trace: [ 297.829522][T11891] dump_stack+0x1dd/0x24e [ 297.833827][T11891] ? devkmsg_release+0x11c/0x11c [ 297.838737][T11891] ? show_regs_print_info+0x12/0x12 [ 297.843959][T11891] ? mutex_lock+0xa6/0x110 [ 297.848358][T11891] ? mutex_trylock+0xb0/0xb0 [ 297.852966][T11891] ? idr_get_free+0x6de/0x880 [ 297.857617][T11891] should_fail+0x6fb/0x860 [ 297.862008][T11891] ? setup_fault_attr+0x3d0/0x3d0 [ 297.867003][T11891] ? selinux_kernfs_init_security+0x1a7/0x810 [ 297.873044][T11891] ? __kernfs_new_node+0xdb/0x6e0 [ 297.878039][T11891] should_failslab+0x5/0x20 [ 297.882517][T11891] kmem_cache_alloc+0x36/0x270 [ 297.887252][T11891] __kernfs_new_node+0xdb/0x6e0 [ 297.892090][T11891] ? kernfs_new_node+0x160/0x160 [ 297.896998][T11891] ? security_kernfs_init_security+0x9a/0xb0 [ 297.902949][T11891] ? mutex_lock+0xa6/0x110 [ 297.907333][T11891] ? mutex_trylock+0xb0/0xb0 [ 297.911902][T11891] kernfs_new_node+0x95/0x160 [ 297.916559][T11891] __kernfs_create_file+0x45/0x260 [ 297.921642][T11891] sysfs_add_file_mode_ns+0x293/0x340 [ 297.926996][T11891] internal_create_group+0x571/0xf50 [ 297.932266][T11891] ? sysfs_create_group+0x20/0x20 [ 297.937317][T11891] ? __loop_update_dio+0x23d/0x580 [ 297.942451][T11891] loop_configure+0xdd7/0x1380 [ 297.947197][T11891] lo_ioctl+0x820/0x23b0 [ 297.951422][T11891] ? memset+0x1f/0x40 [ 297.955376][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.960632][T11891] ? lo_release+0x1e0/0x1e0 [ 297.965107][T11891] ? arch_stack_walk+0xde/0x140 [ 297.969928][T11891] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 297.975879][T11891] ? stack_trace_save+0x1f0/0x1f0 [ 297.980876][T11891] ? preempt_count_add+0x66/0x150 [ 297.985881][T11891] ? memset+0x1f/0x40 [ 297.989843][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 297.995114][T11891] ? arch_stack_walk+0xde/0x140 [ 297.999937][T11891] ? memset+0x1f/0x40 [ 298.003894][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.009148][T11891] ? memset+0x1f/0x40 [ 298.013100][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.018355][T11891] ? arch_stack_walk+0xde/0x140 [ 298.023178][T11891] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 298.029128][T11891] ? preempt_count_add+0x66/0x150 [ 298.034124][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.039389][T11891] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.045435][T11891] ? check_preemption_disabled+0x9e/0x330 [ 298.051220][T11891] ? __rcu_read_lock+0x50/0x50 [ 298.055966][T11891] ? debug_smp_processor_id+0x20/0x20 [ 298.061336][T11891] ? is_bpf_text_address+0x290/0x2b0 [ 298.066611][T11891] ? stack_trace_save+0x1f0/0x1f0 [ 298.071624][T11891] ? __kernel_text_address+0x93/0x110 [ 298.076969][T11891] ? unwind_get_return_address+0x48/0x90 [ 298.082574][T11891] ? __rcu_read_lock+0x50/0x50 [ 298.087309][T11891] ? arch_stack_walk+0xf8/0x140 [ 298.092133][T11891] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 298.098277][T11891] ? refcount_add_checked+0x50/0x50 [ 298.103451][T11891] ? mutex_lock+0xa6/0x110 [ 298.108196][T11891] ? __module_put_and_exit+0x20/0x20 [ 298.113489][T11891] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 298.119625][T11891] ? arch_stack_walk+0xde/0x140 [ 298.124464][T11891] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 298.130467][T11891] ? preempt_count_add+0x66/0x150 [ 298.135482][T11891] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.140738][T11891] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.146774][T11891] ? check_preemption_disabled+0x9e/0x330 [ 298.152487][T11891] ? __rcu_read_lock+0x50/0x50 [ 298.157233][T11891] ? debug_smp_processor_id+0x20/0x20 [ 298.162574][T11891] ? lo_release+0x1e0/0x1e0 [ 298.167050][T11891] blkdev_ioctl+0x8f7/0x2ce0 [ 298.171620][T11891] ? __kernel_text_address+0x93/0x110 [ 298.176972][T11891] ? unwind_get_return_address+0x48/0x90 [ 298.182617][T11891] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 298.187881][T11891] ? arch_stack_walk+0xf8/0x140 [ 298.192706][T11891] ? __rcu_read_lock+0x50/0x50 [ 298.197440][T11891] ? check_preemption_disabled+0x15a/0x330 [ 298.203236][T11891] ? avc_has_extended_perms+0x72a/0x1140 [ 298.209424][T11891] ? avc_has_extended_perms+0xb64/0x1140 [ 298.215027][T11891] ? avc_ss_reset+0x3a0/0x3a0 [ 298.219672][T11891] ? slab_free_freelist_hook+0xd0/0x150 [ 298.225197][T11891] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.231238][T11891] block_ioctl+0xb6/0xf0 [ 298.235452][T11891] ? blkdev_iopoll+0xf0/0xf0 [ 298.240030][T11891] do_vfs_ioctl+0x769/0x1720 [ 298.244592][T11891] ? selinux_file_ioctl+0x72f/0x990 [ 298.249779][T11891] ? ioctl_preallocate+0x250/0x250 [ 298.254863][T11891] ? __fget+0x37c/0x3c0 [ 298.259001][T11891] ? fget_many+0x20/0x20 [ 298.263215][T11891] ? debug_smp_processor_id+0x20/0x20 [ 298.268556][T11891] ? __x64_sys_pwrite64+0x1d9/0x240 [ 298.273724][T11891] ? security_file_ioctl+0xad/0xc0 [ 298.278807][T11891] __x64_sys_ioctl+0xd4/0x110 [ 298.283474][T11891] do_syscall_64+0xcb/0x150 [ 298.287952][T11891] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.293817][T11891] RIP: 0033:0x45e087 [ 298.297683][T11891] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.317746][T11891] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.326129][T11891] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 298.334072][T11891] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:00:35 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x34000}, 0x0) 03:00:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0xfffffffe, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 298.342017][T11891] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 298.349960][T11891] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 298.357901][T11891] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 298.384394][T11891] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:35 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 298.420373][T11891] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 298.423125][T11904] tmpfs: Unknown parameter '' [ 298.465756][T11891] F2FS-fs (loop0): invalid crc_offset: 0 [ 298.479673][T11891] F2FS-fs (loop0): invalid crc_offset: 0 [ 298.486725][T11891] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:35 executing program 0 (fault-call:2 fault-nth:15): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:35 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8000000}, 0x0) 03:00:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x3, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x3}) 03:00:35 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x400300}, 0x0) 03:00:35 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:35 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:35 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1000000}, 0x0) 03:00:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x5, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:35 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xa000000}, 0x0) 03:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x4}) [ 298.620671][T11928] FAULT_INJECTION: forcing a failure. [ 298.620671][T11928] name failslab, interval 1, probability 0, space 0, times 0 [ 298.630325][T11933] tmpfs: Unknown parameter '' [ 298.637735][T11928] CPU: 0 PID: 11928 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 298.648199][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.658249][T11928] Call Trace: [ 298.661540][T11928] dump_stack+0x1dd/0x24e [ 298.665865][T11928] ? devkmsg_release+0x11c/0x11c [ 298.670782][T11928] ? mutex_unlock+0x19/0x40 [ 298.675336][T11928] ? show_regs_print_info+0x12/0x12 [ 298.680503][T11928] ? selinux_kernfs_init_security+0x1a7/0x810 [ 298.686557][T11928] should_fail+0x6fb/0x860 [ 298.690943][T11928] ? setup_fault_attr+0x3d0/0x3d0 [ 298.695949][T11928] ? _raw_spin_lock+0xa3/0x1b0 [ 298.700692][T11928] ? __kernfs_new_node+0xdb/0x6e0 [ 298.705686][T11928] should_failslab+0x5/0x20 [ 298.710172][T11928] kmem_cache_alloc+0x36/0x270 [ 298.714902][T11928] __kernfs_new_node+0xdb/0x6e0 [ 298.719734][T11928] ? mutex_lock+0xa6/0x110 [ 298.724119][T11928] ? kernfs_new_node+0x160/0x160 [ 298.729026][T11928] ? security_kernfs_init_security+0x9a/0xb0 [ 298.734988][T11928] ? kernfs_activate+0x43c/0x460 [ 298.739893][T11928] kernfs_new_node+0x95/0x160 [ 298.744540][T11928] __kernfs_create_file+0x45/0x260 [ 298.749620][T11928] sysfs_add_file_mode_ns+0x293/0x340 [ 298.754959][T11928] internal_create_group+0x571/0xf50 [ 298.760211][T11928] ? sysfs_create_group+0x20/0x20 [ 298.765203][T11928] ? __loop_update_dio+0x23d/0x580 [ 298.770279][T11928] loop_configure+0xdd7/0x1380 [ 298.775009][T11928] lo_ioctl+0x820/0x23b0 [ 298.779219][T11928] ? memset+0x1f/0x40 [ 298.783168][T11928] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.788419][T11928] ? lo_release+0x1e0/0x1e0 [ 298.792906][T11928] ? arch_stack_walk+0xde/0x140 [ 298.797723][T11928] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 298.803675][T11928] ? stack_trace_save+0x1f0/0x1f0 [ 298.808674][T11928] ? preempt_count_add+0x66/0x150 [ 298.813664][T11928] ? memset+0x1f/0x40 [ 298.817614][T11928] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.822868][T11928] ? check_preemption_disabled+0x9e/0x330 [ 298.828553][T11928] ? check_preemption_disabled+0x9e/0x330 [ 298.834238][T11928] ? debug_smp_processor_id+0x20/0x20 [ 298.839579][T11928] ? memset+0x1f/0x40 [ 298.843532][T11928] ? debug_smp_processor_id+0x20/0x20 [ 298.848870][T11928] ? check_preemption_disabled+0x9e/0x330 [ 298.854559][T11928] ? debug_smp_processor_id+0x20/0x20 [ 298.859900][T11928] ? memset+0x1f/0x40 [ 298.863849][T11928] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.869102][T11928] ? arch_stack_walk+0xde/0x140 [ 298.873943][T11928] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 298.879891][T11928] ? preempt_count_add+0x66/0x150 [ 298.884882][T11928] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.890149][T11928] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 298.896273][T11928] ? check_preemption_disabled+0x9e/0x330 [ 298.901963][T11928] ? __rcu_read_lock+0x50/0x50 [ 298.906708][T11928] ? debug_smp_processor_id+0x20/0x20 [ 298.912060][T11928] ? is_bpf_text_address+0x290/0x2b0 [ 298.917312][T11928] ? stack_trace_save+0x1f0/0x1f0 [ 298.922373][T11928] ? __kernel_text_address+0x93/0x110 [ 298.927733][T11928] ? unwind_get_return_address+0x48/0x90 [ 298.933341][T11928] ? __rcu_read_lock+0x50/0x50 [ 298.938087][T11928] ? arch_stack_walk+0xf8/0x140 [ 298.942924][T11928] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 298.949050][T11928] ? refcount_add_checked+0x50/0x50 [ 298.954219][T11928] ? mutex_lock+0xa6/0x110 [ 298.958610][T11928] ? __module_put_and_exit+0x20/0x20 [ 298.963880][T11928] ? avc_denied+0x1c0/0x1c0 [ 298.968351][T11928] ? refcount_sub_and_test_checked+0x1bb/0x290 [ 298.974472][T11928] ? arch_stack_walk+0xde/0x140 [ 298.979300][T11928] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 298.985257][T11928] ? preempt_count_add+0x66/0x150 [ 298.990251][T11928] ? unwind_next_frame+0x1aa9/0x1f30 [ 298.995504][T11928] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.001537][T11928] ? check_preemption_disabled+0x9e/0x330 [ 299.007222][T11928] ? __rcu_read_lock+0x50/0x50 [ 299.011957][T11928] ? debug_smp_processor_id+0x20/0x20 [ 299.017297][T11928] ? lo_release+0x1e0/0x1e0 [ 299.021765][T11928] blkdev_ioctl+0x8f7/0x2ce0 [ 299.026326][T11928] ? __kernel_text_address+0x93/0x110 [ 299.031663][T11928] ? unwind_get_return_address+0x48/0x90 [ 299.037260][T11928] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 299.042510][T11928] ? arch_stack_walk+0xf8/0x140 [ 299.047329][T11928] ? __rcu_read_lock+0x50/0x50 [ 299.052064][T11928] ? check_preemption_disabled+0x15a/0x330 [ 299.057845][T11928] ? avc_has_extended_perms+0x72a/0x1140 [ 299.063447][T11928] ? avc_has_extended_perms+0xb64/0x1140 [ 299.069048][T11928] ? avc_ss_reset+0x3a0/0x3a0 [ 299.073693][T11928] ? slab_free_freelist_hook+0xd0/0x150 [ 299.079207][T11928] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.085262][T11928] block_ioctl+0xb6/0xf0 [ 299.089478][T11928] ? blkdev_iopoll+0xf0/0xf0 [ 299.094054][T11928] do_vfs_ioctl+0x769/0x1720 [ 299.098612][T11928] ? selinux_file_ioctl+0x72f/0x990 [ 299.103791][T11928] ? ioctl_preallocate+0x250/0x250 [ 299.108875][T11928] ? __fget+0x37c/0x3c0 [ 299.112998][T11928] ? fget_many+0x20/0x20 [ 299.117225][T11928] ? debug_smp_processor_id+0x20/0x20 [ 299.122563][T11928] ? __x64_sys_pwrite64+0x1d9/0x240 [ 299.127739][T11928] ? security_file_ioctl+0xad/0xc0 [ 299.132816][T11928] __x64_sys_ioctl+0xd4/0x110 [ 299.137476][T11928] do_syscall_64+0xcb/0x150 [ 299.141948][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.147822][T11928] RIP: 0033:0x45e087 [ 299.151686][T11928] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.171254][T11928] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.179632][T11928] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 299.187571][T11928] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 299.195511][T11928] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 299.203467][T11928] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 299.211405][T11928] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 299.225708][T11928] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 299.233510][T11928] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 299.246919][T11928] F2FS-fs (loop0): invalid crc_offset: 0 [ 299.258808][T11928] F2FS-fs (loop0): invalid crc_offset: 0 03:00:36 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 299.277560][T11944] tmpfs: Unknown parameter '' [ 299.283773][T11928] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:36 executing program 0 (fault-call:2 fault-nth:16): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:36 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x2000000}, 0x0) 03:00:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x5}) 03:00:36 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf000000}, 0x0) 03:00:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0xa, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:36 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:36 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3000000}, 0x0) 03:00:36 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x6}) 03:00:36 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x11000000}, 0x0) [ 299.407780][T11969] tmpfs: Unknown parameter '' [ 299.415797][T11970] FAULT_INJECTION: forcing a failure. [ 299.415797][T11970] name failslab, interval 1, probability 0, space 0, times 0 [ 299.430810][T11970] CPU: 0 PID: 11970 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 299.441084][T11970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.451118][T11970] Call Trace: [ 299.454423][T11970] dump_stack+0x1dd/0x24e [ 299.458760][T11970] ? devkmsg_release+0x11c/0x11c [ 299.463669][T11970] ? mutex_unlock+0x19/0x40 [ 299.468144][T11970] ? show_regs_print_info+0x12/0x12 [ 299.473375][T11970] ? selinux_kernfs_init_security+0x1a7/0x810 [ 299.479423][T11970] should_fail+0x6fb/0x860 [ 299.483817][T11970] ? setup_fault_attr+0x3d0/0x3d0 [ 299.488817][T11970] ? _raw_spin_lock+0xa3/0x1b0 [ 299.493554][T11970] ? __kernfs_new_node+0xdb/0x6e0 [ 299.498550][T11970] should_failslab+0x5/0x20 [ 299.503026][T11970] kmem_cache_alloc+0x36/0x270 [ 299.507761][T11970] __kernfs_new_node+0xdb/0x6e0 [ 299.512582][T11970] ? mutex_lock+0xa6/0x110 [ 299.516967][T11970] ? kernfs_new_node+0x160/0x160 [ 299.521874][T11970] ? security_kernfs_init_security+0x9a/0xb0 [ 299.527823][T11970] ? kernfs_activate+0x43c/0x460 [ 299.532730][T11970] kernfs_new_node+0x95/0x160 [ 299.537378][T11970] __kernfs_create_file+0x45/0x260 [ 299.542457][T11970] sysfs_add_file_mode_ns+0x293/0x340 [ 299.547801][T11970] internal_create_group+0x571/0xf50 [ 299.553060][T11970] ? sysfs_create_group+0x20/0x20 [ 299.558065][T11970] ? __loop_update_dio+0x23d/0x580 [ 299.563143][T11970] loop_configure+0xdd7/0x1380 [ 299.567878][T11970] lo_ioctl+0x820/0x23b0 [ 299.572105][T11970] ? memset+0x1f/0x40 [ 299.576056][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.581310][T11970] ? lo_release+0x1e0/0x1e0 [ 299.585783][T11970] ? arch_stack_walk+0xde/0x140 [ 299.590606][T11970] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 299.596556][T11970] ? stack_trace_save+0x1f0/0x1f0 [ 299.601550][T11970] ? preempt_count_add+0x66/0x150 [ 299.606552][T11970] ? memset+0x1f/0x40 [ 299.610507][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.615763][T11970] ? arch_stack_walk+0xde/0x140 [ 299.620583][T11970] ? memset+0x1f/0x40 [ 299.624537][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.629793][T11970] ? memset+0x1f/0x40 [ 299.633761][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.639015][T11970] ? arch_stack_walk+0xde/0x140 [ 299.643837][T11970] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 299.649787][T11970] ? preempt_count_add+0x66/0x150 [ 299.655317][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.660574][T11970] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.666612][T11970] ? check_preemption_disabled+0x9e/0x330 [ 299.672302][T11970] ? __rcu_read_lock+0x50/0x50 [ 299.677039][T11970] ? debug_smp_processor_id+0x20/0x20 [ 299.682383][T11970] ? is_bpf_text_address+0x290/0x2b0 [ 299.687661][T11970] ? stack_trace_save+0x1f0/0x1f0 [ 299.692654][T11970] ? __kernel_text_address+0x93/0x110 [ 299.697997][T11970] ? unwind_get_return_address+0x48/0x90 [ 299.703624][T11970] ? __rcu_read_lock+0x50/0x50 [ 299.708358][T11970] ? arch_stack_walk+0xf8/0x140 [ 299.713200][T11970] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 299.719327][T11970] ? refcount_add_checked+0x50/0x50 [ 299.724497][T11970] ? mutex_lock+0xa6/0x110 [ 299.728884][T11970] ? __module_put_and_exit+0x20/0x20 [ 299.734138][T11970] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 299.740304][T11970] ? arch_stack_walk+0xde/0x140 [ 299.745128][T11970] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 299.751085][T11970] ? preempt_count_add+0x66/0x150 [ 299.756078][T11970] ? unwind_next_frame+0x1aa9/0x1f30 [ 299.761335][T11970] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.767369][T11970] ? check_preemption_disabled+0x9e/0x330 [ 299.773058][T11970] ? __rcu_read_lock+0x50/0x50 [ 299.777791][T11970] ? debug_smp_processor_id+0x20/0x20 [ 299.783135][T11970] ? lo_release+0x1e0/0x1e0 [ 299.787646][T11970] blkdev_ioctl+0x8f7/0x2ce0 [ 299.792210][T11970] ? __kernel_text_address+0x93/0x110 [ 299.797554][T11970] ? unwind_get_return_address+0x48/0x90 [ 299.803156][T11970] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 299.808411][T11970] ? arch_stack_walk+0xf8/0x140 [ 299.813234][T11970] ? __rcu_read_lock+0x50/0x50 [ 299.817970][T11970] ? check_preemption_disabled+0x15a/0x330 [ 299.823777][T11970] ? avc_has_extended_perms+0x72a/0x1140 [ 299.829379][T11970] ? avc_has_extended_perms+0xb64/0x1140 [ 299.834982][T11970] ? avc_ss_reset+0x3a0/0x3a0 [ 299.839632][T11970] ? slab_free_freelist_hook+0xd0/0x150 [ 299.845153][T11970] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.851198][T11970] block_ioctl+0xb6/0xf0 [ 299.855416][T11970] ? blkdev_iopoll+0xf0/0xf0 [ 299.859977][T11970] do_vfs_ioctl+0x769/0x1720 [ 299.864627][T11970] ? selinux_file_ioctl+0x72f/0x990 [ 299.869798][T11970] ? ioctl_preallocate+0x250/0x250 [ 299.874878][T11970] ? __fget+0x37c/0x3c0 [ 299.879032][T11970] ? fget_many+0x20/0x20 [ 299.883422][T11970] ? debug_smp_processor_id+0x20/0x20 [ 299.888767][T11970] ? __x64_sys_pwrite64+0x1d9/0x240 [ 299.893956][T11970] ? security_file_ioctl+0xad/0xc0 [ 299.899039][T11970] __x64_sys_ioctl+0xd4/0x110 [ 299.903698][T11970] do_syscall_64+0xcb/0x150 [ 299.908197][T11970] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.914160][T11970] RIP: 0033:0x45e087 [ 299.918025][T11970] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.937644][T11970] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.946036][T11970] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 299.953988][T11970] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 299.961936][T11970] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 299.969882][T11970] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 299.977827][T11970] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 300.017008][T11970] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 300.052889][T11970] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 300.059138][T11990] tmpfs: Unknown parameter '' [ 300.067373][T11970] F2FS-fs (loop0): invalid crc_offset: 0 [ 300.073931][T11970] F2FS-fs (loop0): invalid crc_offset: 0 [ 300.080722][T11970] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:37 executing program 0 (fault-call:2 fault-nth:17): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:37 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000000}, 0x0) 03:00:37 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x14000000}, 0x0) 03:00:37 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x3, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x7}) 03:00:37 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:37 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x30000000}, 0x0) 03:00:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x8}) 03:00:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x4, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 300.210711][T12012] tmpfs: Unknown parameter '' [ 300.217313][T12014] FAULT_INJECTION: forcing a failure. [ 300.217313][T12014] name failslab, interval 1, probability 0, space 0, times 0 [ 300.243616][T12014] CPU: 1 PID: 12014 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 300.253798][T12014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.263942][T12014] Call Trace: [ 300.267247][T12014] dump_stack+0x1dd/0x24e [ 300.271547][T12014] ? devkmsg_release+0x11c/0x11c [ 300.276456][T12014] ? mutex_unlock+0x19/0x40 [ 300.280930][T12014] ? show_regs_print_info+0x12/0x12 [ 300.286096][T12014] ? selinux_kernfs_init_security+0x1a7/0x810 [ 300.292144][T12014] should_fail+0x6fb/0x860 [ 300.296528][T12014] ? setup_fault_attr+0x3d0/0x3d0 [ 300.301521][T12014] ? _raw_spin_lock+0xa3/0x1b0 [ 300.306268][T12014] ? __kernfs_new_node+0xdb/0x6e0 [ 300.311259][T12014] should_failslab+0x5/0x20 [ 300.315732][T12014] kmem_cache_alloc+0x36/0x270 [ 300.320467][T12014] __kernfs_new_node+0xdb/0x6e0 [ 300.325289][T12014] ? mutex_lock+0xa6/0x110 [ 300.329677][T12014] ? kernfs_new_node+0x160/0x160 [ 300.334583][T12014] ? security_kernfs_init_security+0x9a/0xb0 [ 300.340533][T12014] ? kernfs_activate+0x43c/0x460 [ 300.345441][T12014] kernfs_new_node+0x95/0x160 [ 300.350090][T12014] __kernfs_create_file+0x45/0x260 [ 300.355172][T12014] sysfs_add_file_mode_ns+0x293/0x340 [ 300.360531][T12014] internal_create_group+0x571/0xf50 [ 300.365786][T12014] ? sysfs_create_group+0x20/0x20 [ 300.370794][T12014] ? __loop_update_dio+0x23d/0x580 [ 300.375876][T12014] loop_configure+0xdd7/0x1380 [ 300.380614][T12014] lo_ioctl+0x820/0x23b0 [ 300.384843][T12014] ? memset+0x1f/0x40 [ 300.388797][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.394050][T12014] ? lo_release+0x1e0/0x1e0 [ 300.398521][T12014] ? arch_stack_walk+0xde/0x140 [ 300.403341][T12014] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 300.409291][T12014] ? stack_trace_save+0x1f0/0x1f0 [ 300.414286][T12014] ? preempt_count_add+0x66/0x150 [ 300.419284][T12014] ? memset+0x1f/0x40 [ 300.423237][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.428492][T12014] ? arch_stack_walk+0xde/0x140 [ 300.433330][T12014] ? memset+0x1f/0x40 [ 300.437283][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.442538][T12014] ? memset+0x1f/0x40 [ 300.446489][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.451744][T12014] ? arch_stack_walk+0xde/0x140 [ 300.456566][T12014] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 300.462517][T12014] ? preempt_count_add+0x66/0x150 [ 300.467510][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.472789][T12014] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.478847][T12014] ? check_preemption_disabled+0x9e/0x330 [ 300.484537][T12014] ? __rcu_read_lock+0x50/0x50 [ 300.489272][T12014] ? debug_smp_processor_id+0x20/0x20 [ 300.494639][T12014] ? is_bpf_text_address+0x290/0x2b0 [ 300.499923][T12014] ? stack_trace_save+0x1f0/0x1f0 [ 300.504917][T12014] ? __kernel_text_address+0x93/0x110 [ 300.510261][T12014] ? unwind_get_return_address+0x48/0x90 [ 300.515863][T12014] ? __rcu_read_lock+0x50/0x50 [ 300.520599][T12014] ? arch_stack_walk+0xf8/0x140 [ 300.525423][T12014] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 300.531566][T12014] ? refcount_add_checked+0x50/0x50 [ 300.536743][T12014] ? mutex_lock+0xa6/0x110 [ 300.541143][T12014] ? __module_put_and_exit+0x20/0x20 [ 300.546457][T12014] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 300.552591][T12014] ? arch_stack_walk+0xde/0x140 [ 300.557415][T12014] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 300.563366][T12014] ? preempt_count_add+0x66/0x150 [ 300.568364][T12014] ? unwind_next_frame+0x1aa9/0x1f30 [ 300.573624][T12014] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.579667][T12014] ? check_preemption_disabled+0x9e/0x330 [ 300.585363][T12014] ? __rcu_read_lock+0x50/0x50 [ 300.590170][T12014] ? debug_smp_processor_id+0x20/0x20 [ 300.595523][T12014] ? lo_release+0x1e0/0x1e0 [ 300.599999][T12014] blkdev_ioctl+0x8f7/0x2ce0 [ 300.604562][T12014] ? __kernel_text_address+0x93/0x110 [ 300.609912][T12014] ? unwind_get_return_address+0x48/0x90 [ 300.615518][T12014] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 300.620774][T12014] ? arch_stack_walk+0xf8/0x140 [ 300.625607][T12014] ? __rcu_read_lock+0x50/0x50 [ 300.630357][T12014] ? check_preemption_disabled+0x15a/0x330 [ 300.636148][T12014] ? avc_has_extended_perms+0x72a/0x1140 [ 300.641766][T12014] ? avc_has_extended_perms+0xb64/0x1140 [ 300.647371][T12014] ? avc_ss_reset+0x3a0/0x3a0 [ 300.652018][T12014] ? slab_free_freelist_hook+0xd0/0x150 [ 300.657534][T12014] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.663580][T12014] block_ioctl+0xb6/0xf0 [ 300.667793][T12014] ? blkdev_iopoll+0xf0/0xf0 [ 300.672358][T12014] do_vfs_ioctl+0x769/0x1720 [ 300.676927][T12014] ? selinux_file_ioctl+0x72f/0x990 [ 300.682096][T12014] ? ioctl_preallocate+0x250/0x250 [ 300.687179][T12014] ? __fget+0x37c/0x3c0 [ 300.691304][T12014] ? fget_many+0x20/0x20 [ 300.695516][T12014] ? debug_smp_processor_id+0x20/0x20 [ 300.700856][T12014] ? __x64_sys_pwrite64+0x1d9/0x240 [ 300.706025][T12014] ? security_file_ioctl+0xad/0xc0 [ 300.711105][T12014] __x64_sys_ioctl+0xd4/0x110 [ 300.715767][T12014] do_syscall_64+0xcb/0x150 [ 300.720249][T12014] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 300.726113][T12014] RIP: 0033:0x45e087 [ 300.730001][T12014] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.749590][T12014] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:00:38 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:38 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8000000}, 0x0) [ 300.757992][T12014] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 300.765933][T12014] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 300.773875][T12014] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 300.781817][T12014] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 300.789760][T12014] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 300.802958][T12014] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 300.836730][T12014] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 300.850421][T12029] tmpfs: Unknown parameter '' [ 300.871870][T12014] F2FS-fs (loop0): invalid crc_offset: 0 [ 300.881927][T12014] F2FS-fs (loop0): invalid crc_offset: 0 [ 300.898645][T12014] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:38 executing program 0 (fault-call:2 fault-nth:18): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:38 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x1100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:38 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf000000}, 0x0) 03:00:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x5, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:38 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x40000000}, 0x0) 03:00:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x9}) 03:00:38 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x11000000}, 0x0) 03:00:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x6, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0xa}) 03:00:38 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x2001001000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 301.071149][T12052] tmpfs: Unknown parameter ' ' [ 301.084189][T12057] FAULT_INJECTION: forcing a failure. [ 301.084189][T12057] name failslab, interval 1, probability 0, space 0, times 0 [ 301.097506][T12057] CPU: 1 PID: 12057 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 301.107653][T12057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.117686][T12057] Call Trace: [ 301.120958][T12057] dump_stack+0x1dd/0x24e [ 301.125306][T12057] ? devkmsg_release+0x11c/0x11c [ 301.130229][T12057] ? mutex_unlock+0x19/0x40 [ 301.134703][T12057] ? show_regs_print_info+0x12/0x12 [ 301.139872][T12057] ? selinux_kernfs_init_security+0x1a7/0x810 [ 301.145909][T12057] should_fail+0x6fb/0x860 [ 301.150296][T12057] ? setup_fault_attr+0x3d0/0x3d0 [ 301.155292][T12057] ? _raw_spin_lock+0xa3/0x1b0 [ 301.160031][T12057] ? __kernfs_new_node+0xdb/0x6e0 [ 301.165053][T12057] should_failslab+0x5/0x20 [ 301.169532][T12057] kmem_cache_alloc+0x36/0x270 [ 301.174275][T12057] __kernfs_new_node+0xdb/0x6e0 [ 301.179147][T12057] ? mutex_lock+0xa6/0x110 [ 301.183558][T12057] ? kernfs_new_node+0x160/0x160 [ 301.188471][T12057] ? security_kernfs_init_security+0x9a/0xb0 [ 301.194427][T12057] ? kernfs_activate+0x43c/0x460 [ 301.199344][T12057] kernfs_new_node+0x95/0x160 [ 301.204101][T12057] __kernfs_create_file+0x45/0x260 [ 301.209183][T12057] sysfs_add_file_mode_ns+0x293/0x340 [ 301.214527][T12057] internal_create_group+0x571/0xf50 [ 301.219790][T12057] ? sysfs_create_group+0x20/0x20 [ 301.224786][T12057] ? __loop_update_dio+0x23d/0x580 [ 301.229885][T12057] loop_configure+0xdd7/0x1380 [ 301.234620][T12057] lo_ioctl+0x820/0x23b0 [ 301.238835][T12057] ? memset+0x1f/0x40 [ 301.242789][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.248042][T12057] ? lo_release+0x1e0/0x1e0 [ 301.252516][T12057] ? arch_stack_walk+0xde/0x140 [ 301.257361][T12057] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 301.263310][T12057] ? stack_trace_save+0x1f0/0x1f0 [ 301.268305][T12057] ? preempt_count_add+0x66/0x150 [ 301.273299][T12057] ? memset+0x1f/0x40 [ 301.277255][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.282515][T12057] ? arch_stack_walk+0xde/0x140 [ 301.287337][T12057] ? memset+0x1f/0x40 [ 301.291286][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.296542][T12057] ? memset+0x1f/0x40 [ 301.300491][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.305744][T12057] ? arch_stack_walk+0xde/0x140 [ 301.310562][T12057] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 301.316512][T12057] ? preempt_count_add+0x66/0x150 [ 301.321512][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.326770][T12057] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.332807][T12057] ? check_preemption_disabled+0x9e/0x330 [ 301.338495][T12057] ? __rcu_read_lock+0x50/0x50 [ 301.343229][T12057] ? debug_smp_processor_id+0x20/0x20 [ 301.348571][T12057] ? is_bpf_text_address+0x290/0x2b0 [ 301.353842][T12057] ? stack_trace_save+0x1f0/0x1f0 [ 301.358866][T12057] ? __kernel_text_address+0x93/0x110 [ 301.364230][T12057] ? unwind_get_return_address+0x48/0x90 [ 301.369840][T12057] ? __rcu_read_lock+0x50/0x50 [ 301.374599][T12057] ? arch_stack_walk+0xf8/0x140 [ 301.379423][T12057] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 301.385547][T12057] ? refcount_add_checked+0x50/0x50 [ 301.390734][T12057] ? mutex_lock+0xa6/0x110 [ 301.395145][T12057] ? __module_put_and_exit+0x20/0x20 [ 301.400400][T12057] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 301.406527][T12057] ? arch_stack_walk+0xde/0x140 [ 301.411348][T12057] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 301.417298][T12057] ? preempt_count_add+0x66/0x150 [ 301.422291][T12057] ? unwind_next_frame+0x1aa9/0x1f30 [ 301.427558][T12057] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.433601][T12057] ? check_preemption_disabled+0x9e/0x330 [ 301.439289][T12057] ? __rcu_read_lock+0x50/0x50 [ 301.444043][T12057] ? debug_smp_processor_id+0x20/0x20 [ 301.449388][T12057] ? lo_release+0x1e0/0x1e0 [ 301.453866][T12057] blkdev_ioctl+0x8f7/0x2ce0 [ 301.458429][T12057] ? __kernel_text_address+0x93/0x110 [ 301.463790][T12057] ? unwind_get_return_address+0x48/0x90 [ 301.469392][T12057] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 301.474645][T12057] ? arch_stack_walk+0xf8/0x140 [ 301.479465][T12057] ? __rcu_read_lock+0x50/0x50 [ 301.484229][T12057] ? check_preemption_disabled+0x15a/0x330 [ 301.490010][T12057] ? avc_has_extended_perms+0x72a/0x1140 [ 301.495613][T12057] ? avc_has_extended_perms+0xb64/0x1140 [ 301.501238][T12057] ? avc_ss_reset+0x3a0/0x3a0 [ 301.505891][T12057] ? slab_free_freelist_hook+0xd0/0x150 [ 301.511414][T12057] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.517463][T12057] block_ioctl+0xb6/0xf0 [ 301.521678][T12057] ? blkdev_iopoll+0xf0/0xf0 [ 301.526237][T12057] do_vfs_ioctl+0x769/0x1720 [ 301.530815][T12057] ? selinux_file_ioctl+0x72f/0x990 [ 301.536013][T12057] ? ioctl_preallocate+0x250/0x250 [ 301.541096][T12057] ? __fget+0x37c/0x3c0 [ 301.545232][T12057] ? fget_many+0x20/0x20 [ 301.549461][T12057] ? debug_smp_processor_id+0x20/0x20 [ 301.554827][T12057] ? __x64_sys_pwrite64+0x1d9/0x240 [ 301.559994][T12057] ? security_file_ioctl+0xad/0xc0 [ 301.565085][T12057] __x64_sys_ioctl+0xd4/0x110 [ 301.569735][T12057] do_syscall_64+0xcb/0x150 [ 301.574212][T12057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 301.580074][T12057] RIP: 0033:0x45e087 [ 301.583957][T12057] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.603541][T12057] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.611923][T12057] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 03:00:39 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x14000000}, 0x0) [ 301.619867][T12057] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 301.627808][T12057] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 301.635758][T12057] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 301.643699][T12057] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:39 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x60000000}, 0x0) [ 301.680769][T12057] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 301.707579][T12070] tmpfs: Unknown parameter ' [ 301.707579][T12070] ' [ 301.714842][T12057] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 301.736756][T12057] F2FS-fs (loop0): invalid crc_offset: 0 [ 301.746206][T12057] F2FS-fs (loop0): invalid crc_offset: 0 [ 301.751905][T12057] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:39 executing program 0 (fault-call:2 fault-nth:19): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x8, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:39 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x2002000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0xb}) 03:00:39 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x80040200}, 0x0) 03:00:39 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x40000000}, 0x0) 03:00:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0xc}) 03:00:39 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe0000000}, 0x0) 03:00:39 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 301.898734][T12096] tmpfs: Unknown parameter ' ' [ 301.899518][T12094] FAULT_INJECTION: forcing a failure. [ 301.899518][T12094] name failslab, interval 1, probability 0, space 0, times 0 [ 301.919498][T12094] CPU: 0 PID: 12094 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 301.929764][T12094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.939799][T12094] Call Trace: [ 301.943095][T12094] dump_stack+0x1dd/0x24e [ 301.947399][T12094] ? devkmsg_release+0x11c/0x11c [ 301.952306][T12094] ? mutex_unlock+0x19/0x40 [ 301.956781][T12094] ? show_regs_print_info+0x12/0x12 [ 301.961948][T12094] ? selinux_kernfs_init_security+0x1a7/0x810 [ 301.967986][T12094] should_fail+0x6fb/0x860 [ 301.972395][T12094] ? setup_fault_attr+0x3d0/0x3d0 [ 301.977390][T12094] ? _raw_spin_lock+0xa3/0x1b0 [ 301.982123][T12094] ? __kernfs_new_node+0xdb/0x6e0 [ 301.987115][T12094] should_failslab+0x5/0x20 [ 301.991603][T12094] kmem_cache_alloc+0x36/0x270 [ 301.996348][T12094] __kernfs_new_node+0xdb/0x6e0 [ 302.001193][T12094] ? mutex_lock+0xa6/0x110 [ 302.005580][T12094] ? kernfs_new_node+0x160/0x160 [ 302.010486][T12094] ? security_kernfs_init_security+0x9a/0xb0 [ 302.016446][T12094] ? kernfs_activate+0x43c/0x460 [ 302.021373][T12094] kernfs_new_node+0x95/0x160 [ 302.026047][T12094] __kernfs_create_file+0x45/0x260 [ 302.031130][T12094] sysfs_add_file_mode_ns+0x293/0x340 [ 302.036477][T12094] internal_create_group+0x571/0xf50 [ 302.041744][T12094] ? sysfs_create_group+0x20/0x20 [ 302.046743][T12094] ? __loop_update_dio+0x23d/0x580 [ 302.051848][T12094] loop_configure+0xdd7/0x1380 [ 302.056591][T12094] lo_ioctl+0x820/0x23b0 [ 302.060826][T12094] ? memset+0x1f/0x40 [ 302.064778][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.070031][T12094] ? lo_release+0x1e0/0x1e0 [ 302.074523][T12094] ? arch_stack_walk+0xde/0x140 [ 302.079353][T12094] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 302.085349][T12094] ? stack_trace_save+0x1f0/0x1f0 [ 302.090355][T12094] ? preempt_count_add+0x66/0x150 [ 302.095396][T12094] ? memset+0x1f/0x40 [ 302.099356][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.104610][T12094] ? arch_stack_walk+0xde/0x140 [ 302.109429][T12094] ? memset+0x1f/0x40 [ 302.113379][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.118632][T12094] ? memset+0x1f/0x40 [ 302.122584][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.127846][T12094] ? arch_stack_walk+0xde/0x140 [ 302.132674][T12094] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 302.138620][T12094] ? preempt_count_add+0x66/0x150 [ 302.143638][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.148892][T12094] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.154933][T12094] ? check_preemption_disabled+0x9e/0x330 [ 302.160626][T12094] ? __rcu_read_lock+0x50/0x50 [ 302.165360][T12094] ? debug_smp_processor_id+0x20/0x20 [ 302.170700][T12094] ? is_bpf_text_address+0x290/0x2b0 [ 302.175954][T12094] ? stack_trace_save+0x1f0/0x1f0 [ 302.180949][T12094] ? __kernel_text_address+0x93/0x110 [ 302.186290][T12094] ? unwind_get_return_address+0x48/0x90 [ 302.191892][T12094] ? __rcu_read_lock+0x50/0x50 [ 302.196625][T12094] ? arch_stack_walk+0xf8/0x140 [ 302.201451][T12094] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 302.207577][T12094] ? refcount_add_checked+0x50/0x50 [ 302.212743][T12094] ? mutex_lock+0xa6/0x110 [ 302.217146][T12094] ? __module_put_and_exit+0x20/0x20 [ 302.222406][T12094] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 302.228531][T12094] ? arch_stack_walk+0xde/0x140 [ 302.233356][T12094] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 302.239303][T12094] ? preempt_count_add+0x66/0x150 [ 302.244296][T12094] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.249554][T12094] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.255613][T12094] ? check_preemption_disabled+0x9e/0x330 [ 302.261310][T12094] ? __rcu_read_lock+0x50/0x50 [ 302.266052][T12094] ? debug_smp_processor_id+0x20/0x20 [ 302.271415][T12094] ? lo_release+0x1e0/0x1e0 [ 302.275888][T12094] blkdev_ioctl+0x8f7/0x2ce0 [ 302.280455][T12094] ? __kernel_text_address+0x93/0x110 [ 302.285825][T12094] ? unwind_get_return_address+0x48/0x90 [ 302.291427][T12094] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 302.296679][T12094] ? arch_stack_walk+0xf8/0x140 [ 302.301506][T12094] ? __rcu_read_lock+0x50/0x50 [ 302.306241][T12094] ? check_preemption_disabled+0x15a/0x330 [ 302.312019][T12094] ? avc_has_extended_perms+0x72a/0x1140 [ 302.317628][T12094] ? avc_has_extended_perms+0xb64/0x1140 [ 302.323259][T12094] ? avc_ss_reset+0x3a0/0x3a0 [ 302.327911][T12094] ? slab_free_freelist_hook+0xd0/0x150 [ 302.333430][T12094] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.339469][T12094] block_ioctl+0xb6/0xf0 [ 302.343683][T12094] ? blkdev_iopoll+0xf0/0xf0 [ 302.348241][T12094] do_vfs_ioctl+0x769/0x1720 [ 302.352806][T12094] ? selinux_file_ioctl+0x72f/0x990 [ 302.357974][T12094] ? ioctl_preallocate+0x250/0x250 [ 302.363064][T12094] ? __fget+0x37c/0x3c0 [ 302.367188][T12094] ? fget_many+0x20/0x20 [ 302.371398][T12094] ? debug_smp_processor_id+0x20/0x20 [ 302.376741][T12094] ? __x64_sys_pwrite64+0x1d9/0x240 [ 302.381910][T12094] ? security_file_ioctl+0xad/0xc0 [ 302.386991][T12094] __x64_sys_ioctl+0xd4/0x110 [ 302.391636][T12094] do_syscall_64+0xcb/0x150 [ 302.396112][T12094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.401975][T12094] RIP: 0033:0x45e087 [ 302.405839][T12094] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.425412][T12094] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.433793][T12094] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 302.441735][T12094] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:00:39 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x60000000}, 0x0) 03:00:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xa, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 302.449677][T12094] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 302.457623][T12094] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 302.465566][T12094] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:39 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 302.503311][T12094] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 302.511057][T12094] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 302.543191][T12109] tmpfs: Unknown parameter ' ' [ 302.561823][T12094] F2FS-fs (loop0): invalid crc_offset: 0 [ 302.579878][T12094] F2FS-fs (loop0): invalid crc_offset: 0 [ 302.592279][T12094] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:40 executing program 0 (fault-call:2 fault-nth:20): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xf, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0xd}) 03:00:40 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe0000000}, 0x0) 03:00:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe8030000}, 0x0) 03:00:40 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x4120439c00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:40 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0xe}) 03:00:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x11, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:40 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffff7f}, 0x0) [ 302.748199][T12138] tmpfs: Unknown parameter '' [ 302.752019][T12136] FAULT_INJECTION: forcing a failure. [ 302.752019][T12136] name failslab, interval 1, probability 0, space 0, times 0 [ 302.772379][T12136] CPU: 1 PID: 12136 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 302.782558][T12136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.792632][T12136] Call Trace: [ 302.795902][T12136] dump_stack+0x1dd/0x24e [ 302.800201][T12136] ? devkmsg_release+0x11c/0x11c [ 302.805110][T12136] ? show_regs_print_info+0x12/0x12 [ 302.810276][T12136] ? kernfs_add_one+0x49e/0x5c0 [ 302.815110][T12136] should_fail+0x6fb/0x860 [ 302.819498][T12136] ? setup_fault_attr+0x3d0/0x3d0 [ 302.824488][T12136] ? sysfs_add_file_mode_ns+0x2b4/0x340 [ 302.830000][T12136] ? kobject_uevent_env+0x266/0x1100 [ 302.835251][T12136] ? dev_uevent_filter+0xb0/0xb0 [ 302.840180][T12136] should_failslab+0x5/0x20 [ 302.844667][T12136] kmem_cache_alloc_trace+0x39/0x290 [ 302.849921][T12136] ? dev_uevent_filter+0xb0/0xb0 [ 302.854839][T12136] kobject_uevent_env+0x266/0x1100 [ 302.859936][T12136] loop_configure+0xea1/0x1380 [ 302.864671][T12136] lo_ioctl+0x820/0x23b0 [ 302.868881][T12136] ? memset+0x1f/0x40 [ 302.872832][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.878095][T12136] ? lo_release+0x1e0/0x1e0 [ 302.882579][T12136] ? arch_stack_walk+0xde/0x140 [ 302.887403][T12136] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 302.893364][T12136] ? stack_trace_save+0x1f0/0x1f0 [ 302.898363][T12136] ? preempt_count_add+0x66/0x150 [ 302.903367][T12136] ? memset+0x1f/0x40 [ 302.907326][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.912615][T12136] ? arch_stack_walk+0xde/0x140 [ 302.917436][T12136] ? memset+0x1f/0x40 [ 302.921387][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.926638][T12136] ? memset+0x1f/0x40 [ 302.930606][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.935858][T12136] ? arch_stack_walk+0xde/0x140 [ 302.940688][T12136] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 302.946634][T12136] ? preempt_count_add+0x66/0x150 [ 302.951626][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 302.956878][T12136] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.962911][T12136] ? check_preemption_disabled+0x9e/0x330 [ 302.968598][T12136] ? __rcu_read_lock+0x50/0x50 [ 302.973327][T12136] ? debug_smp_processor_id+0x20/0x20 [ 302.978666][T12136] ? is_bpf_text_address+0x290/0x2b0 [ 302.983927][T12136] ? stack_trace_save+0x1f0/0x1f0 [ 302.988919][T12136] ? __kernel_text_address+0x93/0x110 [ 302.994261][T12136] ? unwind_get_return_address+0x48/0x90 [ 302.999858][T12136] ? __rcu_read_lock+0x50/0x50 [ 303.004589][T12136] ? arch_stack_walk+0xf8/0x140 [ 303.009424][T12136] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 303.015556][T12136] ? refcount_add_checked+0x50/0x50 [ 303.020720][T12136] ? mutex_lock+0xa6/0x110 [ 303.025120][T12136] ? __module_put_and_exit+0x20/0x20 [ 303.030392][T12136] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 303.036516][T12136] ? arch_stack_walk+0xde/0x140 [ 303.041333][T12136] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 303.047280][T12136] ? preempt_count_add+0x66/0x150 [ 303.052272][T12136] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.057527][T12136] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.063563][T12136] ? check_preemption_disabled+0x9e/0x330 [ 303.069252][T12136] ? __rcu_read_lock+0x50/0x50 [ 303.073983][T12136] ? debug_smp_processor_id+0x20/0x20 [ 303.079383][T12136] ? lo_release+0x1e0/0x1e0 [ 303.083862][T12136] blkdev_ioctl+0x8f7/0x2ce0 [ 303.088425][T12136] ? __kernel_text_address+0x93/0x110 [ 303.093783][T12136] ? unwind_get_return_address+0x48/0x90 [ 303.099399][T12136] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 303.104654][T12136] ? arch_stack_walk+0xf8/0x140 [ 303.109490][T12136] ? __rcu_read_lock+0x50/0x50 [ 303.114222][T12136] ? check_preemption_disabled+0x15a/0x330 [ 303.120000][T12136] ? avc_has_extended_perms+0x72a/0x1140 [ 303.125603][T12136] ? avc_has_extended_perms+0xb64/0x1140 [ 303.131225][T12136] ? avc_ss_reset+0x3a0/0x3a0 [ 303.135884][T12136] ? slab_free_freelist_hook+0xd0/0x150 [ 303.141397][T12136] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.147440][T12136] block_ioctl+0xb6/0xf0 [ 303.151650][T12136] ? blkdev_iopoll+0xf0/0xf0 [ 303.156226][T12136] do_vfs_ioctl+0x769/0x1720 [ 303.160784][T12136] ? selinux_file_ioctl+0x72f/0x990 [ 303.165951][T12136] ? ioctl_preallocate+0x250/0x250 [ 303.171031][T12136] ? __fget+0x37c/0x3c0 [ 303.175156][T12136] ? fget_many+0x20/0x20 [ 303.179367][T12136] ? debug_smp_processor_id+0x20/0x20 [ 303.184705][T12136] ? __x64_sys_pwrite64+0x1d9/0x240 [ 303.189869][T12136] ? security_file_ioctl+0xad/0xc0 [ 303.194961][T12136] __x64_sys_ioctl+0xd4/0x110 [ 303.199623][T12136] do_syscall_64+0xcb/0x150 [ 303.204117][T12136] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.209996][T12136] RIP: 0033:0x45e087 [ 303.213885][T12136] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.233542][T12136] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.241934][T12136] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 03:00:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf4010000}, 0x0) [ 303.249873][T12136] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.257812][T12136] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 303.265751][T12136] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 303.273690][T12136] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 03:00:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfdffffff}, 0x0) [ 303.293833][T12136] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 303.318003][T12136] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 303.337673][T12157] tmpfs: Unknown parameter '' [ 303.346467][T12136] F2FS-fs (loop0): invalid crc_offset: 0 [ 303.358034][T12136] F2FS-fs (loop0): invalid crc_offset: 0 [ 303.371109][T12136] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:40 executing program 0 (fault-call:2 fault-nth:21): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:40 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x7800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x14, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:40 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x40030000000000}, 0x0) 03:00:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x10}) 03:00:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfeffffff}, 0x0) 03:00:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x30, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:40 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffff7f}, 0x0) 03:00:40 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x100000000000000}, 0x0) 03:00:40 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x8000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x11}) [ 303.525615][T12184] tmpfs: Unknown parameter '' [ 303.530728][T12186] FAULT_INJECTION: forcing a failure. [ 303.530728][T12186] name failslab, interval 1, probability 0, space 0, times 0 [ 303.545347][T12186] CPU: 0 PID: 12186 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 303.555507][T12186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.565550][T12186] Call Trace: [ 303.568869][T12186] dump_stack+0x1dd/0x24e [ 303.573179][T12186] ? devkmsg_release+0x11c/0x11c [ 303.578096][T12186] ? show_regs_print_info+0x12/0x12 [ 303.583268][T12186] should_fail+0x6fb/0x860 [ 303.587662][T12186] ? setup_fault_attr+0x3d0/0x3d0 [ 303.592672][T12186] ? kzalloc+0x22/0x40 [ 303.596710][T12186] should_failslab+0x5/0x20 [ 303.601186][T12186] __kmalloc+0x5f/0x2d0 [ 303.605310][T12186] ? kobject_uevent_env+0x266/0x1100 [ 303.610560][T12186] kzalloc+0x22/0x40 [ 303.614442][T12186] kobject_get_path+0xb3/0x190 [ 303.619176][T12186] kobject_uevent_env+0x28c/0x1100 [ 303.624259][T12186] loop_configure+0xea1/0x1380 [ 303.629006][T12186] lo_ioctl+0x820/0x23b0 [ 303.633220][T12186] ? memset+0x1f/0x40 [ 303.637173][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.642431][T12186] ? lo_release+0x1e0/0x1e0 [ 303.646903][T12186] ? arch_stack_walk+0xde/0x140 [ 303.651724][T12186] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 303.657673][T12186] ? stack_trace_save+0x1f0/0x1f0 [ 303.662677][T12186] ? preempt_count_add+0x66/0x150 [ 303.667681][T12186] ? memset+0x1f/0x40 [ 303.671685][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.677063][T12186] ? arch_stack_walk+0xde/0x140 [ 303.681902][T12186] ? memset+0x1f/0x40 [ 303.685858][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.691116][T12186] ? memset+0x1f/0x40 [ 303.695069][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.700348][T12186] ? arch_stack_walk+0xde/0x140 [ 303.705171][T12186] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 303.711127][T12186] ? preempt_count_add+0x66/0x150 [ 303.716143][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.721410][T12186] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.727449][T12186] ? check_preemption_disabled+0x9e/0x330 [ 303.733142][T12186] ? __rcu_read_lock+0x50/0x50 [ 303.737910][T12186] ? debug_smp_processor_id+0x20/0x20 [ 303.743251][T12186] ? is_bpf_text_address+0x290/0x2b0 [ 303.748507][T12186] ? stack_trace_save+0x1f0/0x1f0 [ 303.753508][T12186] ? __kernel_text_address+0x93/0x110 [ 303.758852][T12186] ? unwind_get_return_address+0x48/0x90 [ 303.764573][T12186] ? __rcu_read_lock+0x50/0x50 [ 303.769307][T12186] ? arch_stack_walk+0xf8/0x140 [ 303.774134][T12186] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 303.780256][T12186] ? refcount_add_checked+0x50/0x50 [ 303.785427][T12186] ? mutex_lock+0xa6/0x110 [ 303.789822][T12186] ? __module_put_and_exit+0x20/0x20 [ 303.795101][T12186] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 303.801235][T12186] ? arch_stack_walk+0xde/0x140 [ 303.806066][T12186] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 303.812021][T12186] ? preempt_count_add+0x66/0x150 [ 303.817018][T12186] ? unwind_next_frame+0x1aa9/0x1f30 [ 303.822276][T12186] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.828317][T12186] ? check_preemption_disabled+0x9e/0x330 [ 303.834008][T12186] ? __rcu_read_lock+0x50/0x50 [ 303.838744][T12186] ? debug_smp_processor_id+0x20/0x20 [ 303.844088][T12186] ? lo_release+0x1e0/0x1e0 [ 303.848563][T12186] blkdev_ioctl+0x8f7/0x2ce0 [ 303.853128][T12186] ? __kernel_text_address+0x93/0x110 [ 303.858483][T12186] ? unwind_get_return_address+0x48/0x90 [ 303.864090][T12186] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 303.869350][T12186] ? arch_stack_walk+0xf8/0x140 [ 303.874196][T12186] ? __rcu_read_lock+0x50/0x50 [ 303.878949][T12186] ? check_preemption_disabled+0x15a/0x330 [ 303.884727][T12186] ? avc_has_extended_perms+0x72a/0x1140 [ 303.890350][T12186] ? avc_has_extended_perms+0xb64/0x1140 [ 303.895955][T12186] ? avc_ss_reset+0x3a0/0x3a0 [ 303.900603][T12186] ? slab_free_freelist_hook+0xd0/0x150 [ 303.906132][T12186] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.912181][T12186] block_ioctl+0xb6/0xf0 [ 303.916400][T12186] ? blkdev_iopoll+0xf0/0xf0 [ 303.920967][T12186] do_vfs_ioctl+0x769/0x1720 [ 303.925535][T12186] ? selinux_file_ioctl+0x72f/0x990 [ 303.930792][T12186] ? ioctl_preallocate+0x250/0x250 [ 303.935877][T12186] ? __fget+0x37c/0x3c0 [ 303.940019][T12186] ? fget_many+0x20/0x20 [ 303.944248][T12186] ? debug_smp_processor_id+0x20/0x20 [ 303.949598][T12186] ? __x64_sys_pwrite64+0x1d9/0x240 [ 303.954793][T12186] ? security_file_ioctl+0xad/0xc0 [ 303.959880][T12186] __x64_sys_ioctl+0xd4/0x110 [ 303.964533][T12186] do_syscall_64+0xcb/0x150 [ 303.969014][T12186] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 303.974885][T12186] RIP: 0033:0x45e087 [ 303.978763][T12186] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.998361][T12186] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.006745][T12186] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 304.014709][T12186] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:00:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x60, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 304.022658][T12186] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 304.030601][T12186] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 304.038556][T12186] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 304.057380][T12186] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 304.080328][T12186] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 304.105651][T12202] tmpfs: Unknown parameter '' [ 304.106494][T12186] F2FS-fs (loop0): invalid crc_offset: 0 [ 304.124043][T12186] F2FS-fs (loop0): invalid crc_offset: 0 [ 304.131283][T12186] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:41 executing program 0 (fault-call:2 fault-nth:22): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:41 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfffffffd}, 0x0) 03:00:41 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x8dffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xe0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:41 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x200000000000000}, 0x0) 03:00:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x12}) 03:00:41 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xa005000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:41 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x300000000000000}, 0x0) 03:00:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x1f4, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:41 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfffffffe}, 0x0) [ 304.288638][T12226] tmpfs: Unknown parameter '' [ 304.306532][T12225] FAULT_INJECTION: forcing a failure. [ 304.306532][T12225] name failslab, interval 1, probability 0, space 0, times 0 [ 304.325234][T12225] CPU: 0 PID: 12225 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 03:00:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x18}) 03:00:41 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xc805000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 304.335396][T12225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.345438][T12225] Call Trace: [ 304.348707][T12225] dump_stack+0x1dd/0x24e [ 304.353024][T12225] ? devkmsg_release+0x11c/0x11c [ 304.357949][T12225] ? show_regs_print_info+0x12/0x12 [ 304.363265][T12225] ? vsnprintf+0x1ba3/0x1c50 [ 304.367844][T12225] should_fail+0x6fb/0x860 [ 304.372235][T12225] ? setup_fault_attr+0x3d0/0x3d0 [ 304.377273][T12225] ? __alloc_skb+0x88/0x4d0 [ 304.381752][T12225] should_failslab+0x5/0x20 [ 304.386228][T12225] kmem_cache_alloc+0x36/0x270 [ 304.390979][T12225] __alloc_skb+0x88/0x4d0 [ 304.395286][T12225] alloc_uevent_skb+0x73/0x220 [ 304.400019][T12225] kobject_uevent_env+0xb84/0x1100 [ 304.405107][T12225] loop_configure+0xea1/0x1380 [ 304.409856][T12225] lo_ioctl+0x820/0x23b0 [ 304.414068][T12225] ? memset+0x1f/0x40 [ 304.418025][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.423290][T12225] ? lo_release+0x1e0/0x1e0 [ 304.427778][T12225] ? arch_stack_walk+0xde/0x140 [ 304.432614][T12225] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 304.438572][T12225] ? stack_trace_save+0x1f0/0x1f0 [ 304.443577][T12225] ? preempt_count_add+0x66/0x150 [ 304.448578][T12225] ? memset+0x1f/0x40 [ 304.452536][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.457796][T12225] ? arch_stack_walk+0xde/0x140 [ 304.462615][T12225] ? memset+0x1f/0x40 [ 304.466569][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.471824][T12225] ? memset+0x1f/0x40 [ 304.475778][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.481037][T12225] ? arch_stack_walk+0xde/0x140 [ 304.485881][T12225] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 304.491860][T12225] ? preempt_count_add+0x66/0x150 [ 304.496864][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.502124][T12225] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.508271][T12225] ? check_preemption_disabled+0x9e/0x330 [ 304.513963][T12225] ? __rcu_read_lock+0x50/0x50 [ 304.518700][T12225] ? debug_smp_processor_id+0x20/0x20 [ 304.524044][T12225] ? is_bpf_text_address+0x290/0x2b0 [ 304.529303][T12225] ? stack_trace_save+0x1f0/0x1f0 [ 304.534355][T12225] ? __kernel_text_address+0x93/0x110 [ 304.539698][T12225] ? unwind_get_return_address+0x48/0x90 [ 304.545352][T12225] ? __rcu_read_lock+0x50/0x50 [ 304.550085][T12225] ? arch_stack_walk+0xf8/0x140 [ 304.554912][T12225] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 304.561036][T12225] ? refcount_add_checked+0x50/0x50 [ 304.566203][T12225] ? mutex_lock+0xa6/0x110 [ 304.570591][T12225] ? __module_put_and_exit+0x20/0x20 [ 304.575849][T12225] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 304.581999][T12225] ? arch_stack_walk+0xde/0x140 [ 304.586825][T12225] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 304.592775][T12225] ? preempt_count_add+0x66/0x150 [ 304.597770][T12225] ? unwind_next_frame+0x1aa9/0x1f30 [ 304.603032][T12225] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.609075][T12225] ? check_preemption_disabled+0x9e/0x330 [ 304.614767][T12225] ? __rcu_read_lock+0x50/0x50 [ 304.619501][T12225] ? debug_smp_processor_id+0x20/0x20 [ 304.624849][T12225] ? lo_release+0x1e0/0x1e0 [ 304.629326][T12225] blkdev_ioctl+0x8f7/0x2ce0 [ 304.633890][T12225] ? __kernel_text_address+0x93/0x110 [ 304.639231][T12225] ? unwind_get_return_address+0x48/0x90 [ 304.644849][T12225] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 304.650105][T12225] ? arch_stack_walk+0xf8/0x140 [ 304.654927][T12225] ? __rcu_read_lock+0x50/0x50 [ 304.659660][T12225] ? check_preemption_disabled+0x15a/0x330 [ 304.665464][T12225] ? avc_has_extended_perms+0x72a/0x1140 [ 304.671069][T12225] ? avc_has_extended_perms+0xb64/0x1140 [ 304.676673][T12225] ? avc_ss_reset+0x3a0/0x3a0 [ 304.681323][T12225] ? slab_free_freelist_hook+0xd0/0x150 [ 304.686838][T12225] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.692877][T12225] block_ioctl+0xb6/0xf0 [ 304.697088][T12225] ? blkdev_iopoll+0xf0/0xf0 [ 304.701648][T12225] do_vfs_ioctl+0x769/0x1720 [ 304.706214][T12225] ? selinux_file_ioctl+0x72f/0x990 [ 304.711387][T12225] ? ioctl_preallocate+0x250/0x250 [ 304.716472][T12225] ? __fget+0x37c/0x3c0 [ 304.720596][T12225] ? fget_many+0x20/0x20 [ 304.724811][T12225] ? debug_smp_processor_id+0x20/0x20 [ 304.730165][T12225] ? __x64_sys_pwrite64+0x1d9/0x240 [ 304.735460][T12225] ? security_file_ioctl+0xad/0xc0 [ 304.740579][T12225] __x64_sys_ioctl+0xd4/0x110 [ 304.745231][T12225] do_syscall_64+0xcb/0x150 [ 304.749726][T12225] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 304.755598][T12225] RIP: 0033:0x45e087 [ 304.759468][T12225] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.779060][T12225] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.787441][T12225] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 304.795385][T12225] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 304.803327][T12225] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 304.811271][T12225] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 304.819215][T12225] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 304.858485][T12225] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 304.879486][T12244] tmpfs: Unknown parameter '' [ 304.881622][T12225] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 304.904866][T12225] F2FS-fs (loop0): invalid crc_offset: 0 [ 304.926143][T12225] F2FS-fs (loop0): invalid crc_offset: 0 [ 304.931860][T12225] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:42 executing program 0 (fault-call:2 fault-nth:23): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:42 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x400000000000000}, 0x0) 03:00:42 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xe0ffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x300, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:42 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000000000000}, 0x0) 03:00:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x22}) 03:00:42 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xeffdffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:42 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x800000000000000}, 0x0) 03:00:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x3e8, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}], [], 0x26}) 03:00:42 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 305.050840][T12268] tmpfs: Unknown parameter '"' [ 305.056105][T12269] FAULT_INJECTION: forcing a failure. [ 305.056105][T12269] name failslab, interval 1, probability 0, space 0, times 0 [ 305.072642][T12269] CPU: 1 PID: 12269 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 305.082913][T12269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.093055][T12269] Call Trace: [ 305.096327][T12269] dump_stack+0x1dd/0x24e [ 305.100629][T12269] ? devkmsg_release+0x11c/0x11c [ 305.105551][T12269] ? show_regs_print_info+0x12/0x12 [ 305.110726][T12269] should_fail+0x6fb/0x860 [ 305.115142][T12269] ? setup_fault_attr+0x3d0/0x3d0 [ 305.120149][T12269] ? alloc_uevent_skb+0x73/0x220 [ 305.125069][T12269] should_failslab+0x5/0x20 [ 305.129545][T12269] __kmalloc_track_caller+0x5d/0x2c0 [ 305.134812][T12269] ? kmem_cache_alloc+0x1e0/0x270 [ 305.139818][T12269] ? alloc_uevent_skb+0x73/0x220 [ 305.144726][T12269] __alloc_skb+0xd1/0x4d0 [ 305.149029][T12269] alloc_uevent_skb+0x73/0x220 [ 305.153765][T12269] kobject_uevent_env+0xb84/0x1100 [ 305.158848][T12269] loop_configure+0xea1/0x1380 [ 305.163600][T12269] lo_ioctl+0x820/0x23b0 [ 305.167813][T12269] ? memset+0x1f/0x40 [ 305.171770][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.177023][T12269] ? lo_release+0x1e0/0x1e0 [ 305.181498][T12269] ? arch_stack_walk+0xde/0x140 [ 305.186471][T12269] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 305.192427][T12269] ? stack_trace_save+0x1f0/0x1f0 [ 305.197424][T12269] ? preempt_count_add+0x66/0x150 [ 305.202418][T12269] ? memset+0x1f/0x40 [ 305.206375][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.211636][T12269] ? arch_stack_walk+0xde/0x140 [ 305.216456][T12269] ? memset+0x1f/0x40 [ 305.220411][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.225673][T12269] ? memset+0x1f/0x40 [ 305.229625][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.234879][T12269] ? arch_stack_walk+0xde/0x140 [ 305.239701][T12269] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 305.245648][T12269] ? preempt_count_add+0x66/0x150 [ 305.250642][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.255899][T12269] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.261934][T12269] ? check_preemption_disabled+0x9e/0x330 [ 305.267623][T12269] ? __rcu_read_lock+0x50/0x50 [ 305.272374][T12269] ? debug_smp_processor_id+0x20/0x20 [ 305.277736][T12269] ? is_bpf_text_address+0x290/0x2b0 [ 305.282997][T12269] ? stack_trace_save+0x1f0/0x1f0 [ 305.287996][T12269] ? __kernel_text_address+0x93/0x110 [ 305.293336][T12269] ? unwind_get_return_address+0x48/0x90 [ 305.298958][T12269] ? __rcu_read_lock+0x50/0x50 [ 305.303706][T12269] ? arch_stack_walk+0xf8/0x140 [ 305.308529][T12269] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 305.314652][T12269] ? refcount_add_checked+0x50/0x50 [ 305.319936][T12269] ? mutex_lock+0xa6/0x110 [ 305.324322][T12269] ? __module_put_and_exit+0x20/0x20 [ 305.329592][T12269] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 305.335719][T12269] ? arch_stack_walk+0xde/0x140 [ 305.340556][T12269] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 305.346522][T12269] ? preempt_count_add+0x66/0x150 [ 305.351515][T12269] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.356771][T12269] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.362806][T12269] ? check_preemption_disabled+0x9e/0x330 [ 305.368535][T12269] ? __rcu_read_lock+0x50/0x50 [ 305.373273][T12269] ? debug_smp_processor_id+0x20/0x20 [ 305.378642][T12269] ? lo_release+0x1e0/0x1e0 [ 305.383253][T12269] blkdev_ioctl+0x8f7/0x2ce0 [ 305.387852][T12269] ? __kernel_text_address+0x93/0x110 [ 305.393193][T12269] ? unwind_get_return_address+0x48/0x90 [ 305.398793][T12269] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 305.404045][T12269] ? arch_stack_walk+0xf8/0x140 [ 305.408867][T12269] ? __rcu_read_lock+0x50/0x50 [ 305.413603][T12269] ? check_preemption_disabled+0x15a/0x330 [ 305.419382][T12269] ? avc_has_extended_perms+0x72a/0x1140 [ 305.424987][T12269] ? avc_has_extended_perms+0xb64/0x1140 [ 305.430588][T12269] ? avc_ss_reset+0x3a0/0x3a0 [ 305.435235][T12269] ? slab_free_freelist_hook+0xd0/0x150 [ 305.440749][T12269] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.446790][T12269] block_ioctl+0xb6/0xf0 [ 305.451001][T12269] ? blkdev_iopoll+0xf0/0xf0 [ 305.455559][T12269] do_vfs_ioctl+0x769/0x1720 [ 305.460126][T12269] ? selinux_file_ioctl+0x72f/0x990 [ 305.465309][T12269] ? ioctl_preallocate+0x250/0x250 [ 305.470401][T12269] ? __fget+0x37c/0x3c0 [ 305.474533][T12269] ? fget_many+0x20/0x20 [ 305.478749][T12269] ? debug_smp_processor_id+0x20/0x20 [ 305.484094][T12269] ? __x64_sys_pwrite64+0x1d9/0x240 [ 305.489274][T12269] ? security_file_ioctl+0xad/0xc0 [ 305.494358][T12269] __x64_sys_ioctl+0xd4/0x110 [ 305.499025][T12269] do_syscall_64+0xcb/0x150 [ 305.503503][T12269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 305.509397][T12269] RIP: 0033:0x45e087 [ 305.513263][T12269] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.532838][T12269] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.541232][T12269] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 03:00:42 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x40030000000000}, 0x0) [ 305.549187][T12269] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.557132][T12269] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 305.565076][T12269] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 305.573063][T12269] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 305.608154][T12269] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 305.625174][T12269] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 305.635044][T12285] tmpfs: Unknown parameter '&' [ 305.655263][T12285] tmpfs: Unknown parameter '&' [ 305.674429][T12269] F2FS-fs (loop0): invalid crc_offset: 0 [ 305.695561][T12269] F2FS-fs (loop0): invalid crc_offset: 0 [ 305.705181][T12269] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:43 executing program 0 (fault-call:2 fault-nth:24): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:43 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfc00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:43 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x100000000000000}, 0x0) 03:00:43 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf00000000000000}, 0x0) 03:00:43 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x500, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000040)={0x31be2256, 0x20, [], 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0]}) r2 = accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000140)=0x6e, 0x80800) r3 = accept4$bt_l2cap(r1, &(0x7f0000000400), &(0x7f0000000500)=0xe, 0x800) fcntl$dupfd(r2, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}, 0x6}, {{&(0x7f0000000280)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x42, &(0x7f0000000300)=""/72, 0x39}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/169, 0xa2}, {0x0}, {0x0, 0xfffffffffffffe02}, {&(0x7f0000000180)=""/77}], 0x3}}], 0x3, 0x3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r5, 0x40089413, &(0x7f0000000080)=0x6) ioctl$FIONCLEX(r4, 0x5450) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f0000000540)) 03:00:43 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1100000000000000}, 0x0) 03:00:43 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x200000000000000}, 0x0) 03:00:43 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfe80000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:43 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x600, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:43 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfe80ffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 305.866103][T12313] FAULT_INJECTION: forcing a failure. [ 305.866103][T12313] name failslab, interval 1, probability 0, space 0, times 0 [ 305.879064][T12313] CPU: 0 PID: 12313 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 305.889210][T12313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.899279][T12313] Call Trace: [ 305.902552][T12313] dump_stack+0x1dd/0x24e [ 305.906858][T12313] ? devkmsg_release+0x11c/0x11c [ 305.911779][T12313] ? vsnprintf+0x1ba3/0x1c50 [ 305.916411][T12313] ? show_regs_print_info+0x12/0x12 [ 305.921598][T12313] should_fail+0x6fb/0x860 [ 305.926005][T12313] ? setup_fault_attr+0x3d0/0x3d0 [ 305.931003][T12313] ? add_uevent_var+0x1c2/0x360 [ 305.935830][T12313] ? call_usermodehelper_setup+0x83/0x210 [ 305.941538][T12313] should_failslab+0x5/0x20 [ 305.946014][T12313] kmem_cache_alloc_trace+0x39/0x290 [ 305.951284][T12313] ? kobject_uevent_env+0x1100/0x1100 [ 305.956649][T12313] call_usermodehelper_setup+0x83/0x210 [ 305.962166][T12313] ? add_uevent_var+0x360/0x360 [ 305.966987][T12313] kobject_uevent_env+0xea8/0x1100 [ 305.972159][T12313] loop_configure+0xea1/0x1380 [ 305.976913][T12313] lo_ioctl+0x820/0x23b0 [ 305.981128][T12313] ? memset+0x1f/0x40 [ 305.985088][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 305.990352][T12313] ? lo_release+0x1e0/0x1e0 [ 305.994829][T12313] ? arch_stack_walk+0xde/0x140 [ 305.999717][T12313] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 306.005668][T12313] ? stack_trace_save+0x1f0/0x1f0 [ 306.010668][T12313] ? preempt_count_add+0x66/0x150 [ 306.015663][T12313] ? memset+0x1f/0x40 [ 306.019671][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.025052][T12313] ? arch_stack_walk+0xde/0x140 [ 306.029873][T12313] ? memset+0x1f/0x40 [ 306.033847][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.039104][T12313] ? memset+0x1f/0x40 [ 306.043055][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.048318][T12313] ? arch_stack_walk+0xde/0x140 [ 306.053152][T12313] ? common_interrupt+0xa/0xf [ 306.057812][T12313] ? do_sys_open+0x37f/0x7b0 [ 306.062378][T12313] ? stack_trace_consume_entry+0x15c/0x230 [ 306.068330][T12313] ? preempt_count_add+0x66/0x150 [ 306.073333][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.078599][T12313] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.084642][T12313] ? check_preemption_disabled+0x9e/0x330 [ 306.090353][T12313] ? __rcu_read_lock+0x50/0x50 [ 306.095093][T12313] ? debug_smp_processor_id+0x20/0x20 [ 306.100483][T12313] ? is_bpf_text_address+0x290/0x2b0 [ 306.105850][T12313] ? stack_trace_save+0x1f0/0x1f0 [ 306.110863][T12313] ? __kernel_text_address+0x93/0x110 [ 306.116225][T12313] ? unwind_get_return_address+0x48/0x90 [ 306.121839][T12313] ? __rcu_read_lock+0x50/0x50 [ 306.126632][T12313] ? arch_stack_walk+0xf8/0x140 [ 306.131459][T12313] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 306.137587][T12313] ? refcount_add_checked+0x50/0x50 [ 306.142774][T12313] ? mutex_lock+0xa6/0x110 [ 306.147160][T12313] ? __module_put_and_exit+0x20/0x20 [ 306.152418][T12313] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 306.158560][T12313] ? arch_stack_walk+0xde/0x140 [ 306.163383][T12313] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 306.169331][T12313] ? preempt_count_add+0x66/0x150 [ 306.174327][T12313] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.179615][T12313] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.185652][T12313] ? check_preemption_disabled+0x9e/0x330 [ 306.191344][T12313] ? __rcu_read_lock+0x50/0x50 [ 306.196085][T12313] ? debug_smp_processor_id+0x20/0x20 [ 306.201445][T12313] ? lo_release+0x1e0/0x1e0 [ 306.205921][T12313] blkdev_ioctl+0x8f7/0x2ce0 [ 306.210502][T12313] ? __kernel_text_address+0x93/0x110 [ 306.215862][T12313] ? unwind_get_return_address+0x48/0x90 [ 306.221465][T12313] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 306.226738][T12313] ? arch_stack_walk+0xf8/0x140 [ 306.231561][T12313] ? __rcu_read_lock+0x50/0x50 [ 306.236296][T12313] ? check_preemption_disabled+0x15a/0x330 [ 306.242081][T12313] ? avc_has_extended_perms+0x72a/0x1140 [ 306.247686][T12313] ? avc_has_extended_perms+0xb64/0x1140 [ 306.253289][T12313] ? avc_ss_reset+0x3a0/0x3a0 [ 306.257935][T12313] ? slab_free_freelist_hook+0xd0/0x150 [ 306.263454][T12313] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.269497][T12313] block_ioctl+0xb6/0xf0 [ 306.273713][T12313] ? blkdev_iopoll+0xf0/0xf0 [ 306.278274][T12313] do_vfs_ioctl+0x769/0x1720 [ 306.282834][T12313] ? selinux_file_ioctl+0x72f/0x990 [ 306.288001][T12313] ? ioctl_preallocate+0x250/0x250 [ 306.293085][T12313] ? __fget+0x37c/0x3c0 [ 306.297220][T12313] ? fget_many+0x20/0x20 [ 306.301445][T12313] ? debug_smp_processor_id+0x20/0x20 [ 306.306787][T12313] ? __x64_sys_pwrite64+0x1d9/0x240 [ 306.311958][T12313] ? security_file_ioctl+0xad/0xc0 [ 306.317045][T12313] __x64_sys_ioctl+0xd4/0x110 [ 306.321728][T12313] do_syscall_64+0xcb/0x150 [ 306.326205][T12313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.332077][T12313] RIP: 0033:0x45e087 [ 306.335943][T12313] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.355534][T12313] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:00:43 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1400000000000000}, 0x0) [ 306.363914][T12313] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 306.371859][T12313] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.379804][T12313] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 306.387746][T12313] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 306.395686][T12313] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 306.426042][T12313] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 306.454956][T12313] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 306.477037][T12313] F2FS-fs (loop0): invalid crc_offset: 0 [ 306.484301][T12313] F2FS-fs (loop0): invalid crc_offset: 0 [ 306.490025][T12313] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:43 executing program 0 (fault-call:2 fault-nth:25): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:43 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xa00, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:43 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000000000000000}, 0x0) 03:00:43 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x300000000000000}, 0x0) 03:00:43 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfec0ffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 306.659014][T12351] FAULT_INJECTION: forcing a failure. [ 306.659014][T12351] name failslab, interval 1, probability 0, space 0, times 0 [ 306.672816][T12351] CPU: 1 PID: 12351 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 306.682983][T12351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.693062][T12351] Call Trace: [ 306.696335][T12351] dump_stack+0x1dd/0x24e [ 306.700637][T12351] ? devkmsg_release+0x11c/0x11c [ 306.705544][T12351] ? vsnprintf+0x1ba3/0x1c50 [ 306.710111][T12351] ? show_regs_print_info+0x12/0x12 [ 306.715326][T12351] should_fail+0x6fb/0x860 [ 306.719719][T12351] ? setup_fault_attr+0x3d0/0x3d0 [ 306.724715][T12351] ? add_uevent_var+0x1c2/0x360 [ 306.729568][T12351] ? call_usermodehelper_setup+0x83/0x210 [ 306.735266][T12351] should_failslab+0x5/0x20 [ 306.739740][T12351] kmem_cache_alloc_trace+0x39/0x290 [ 306.745014][T12351] ? kobject_uevent_env+0x1100/0x1100 [ 306.750359][T12351] call_usermodehelper_setup+0x83/0x210 03:00:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="687567653d6e6576657239d6"]) 03:00:44 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:44 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x400000000000000}, 0x0) 03:00:44 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6000000000000000}, 0x0) 03:00:44 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xf00, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:44 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xff00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 306.755877][T12351] ? add_uevent_var+0x360/0x360 [ 306.760698][T12351] kobject_uevent_env+0xea8/0x1100 [ 306.765780][T12351] loop_configure+0xea1/0x1380 [ 306.770513][T12351] lo_ioctl+0x820/0x23b0 [ 306.774732][T12351] ? memset+0x1f/0x40 [ 306.778695][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.783959][T12351] ? lo_release+0x1e0/0x1e0 [ 306.788456][T12351] ? arch_stack_walk+0xde/0x140 [ 306.793304][T12351] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 306.799272][T12351] ? stack_trace_save+0x1f0/0x1f0 [ 306.804282][T12351] ? preempt_count_add+0x66/0x150 [ 306.809322][T12351] ? memset+0x1f/0x40 [ 306.813293][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.818553][T12351] ? arch_stack_walk+0xde/0x140 [ 306.823379][T12351] ? memset+0x1f/0x40 [ 306.827336][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.832605][T12351] ? memset+0x1f/0x40 [ 306.836556][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.841819][T12351] ? arch_stack_walk+0xde/0x140 [ 306.846643][T12351] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 306.852608][T12351] ? preempt_count_add+0x66/0x150 [ 306.857608][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.862872][T12351] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.868917][T12351] ? check_preemption_disabled+0x9e/0x330 [ 306.874613][T12351] ? __rcu_read_lock+0x50/0x50 [ 306.879350][T12351] ? debug_smp_processor_id+0x20/0x20 [ 306.884798][T12351] ? is_bpf_text_address+0x290/0x2b0 [ 306.890054][T12351] ? stack_trace_save+0x1f0/0x1f0 [ 306.895065][T12351] ? __kernel_text_address+0x93/0x110 [ 306.900406][T12351] ? unwind_get_return_address+0x48/0x90 [ 306.906016][T12351] ? __rcu_read_lock+0x50/0x50 [ 306.910748][T12351] ? arch_stack_walk+0xf8/0x140 [ 306.915571][T12351] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 306.921693][T12351] ? refcount_add_checked+0x50/0x50 [ 306.926884][T12351] ? mutex_lock+0xa6/0x110 [ 306.931274][T12351] ? __module_put_and_exit+0x20/0x20 [ 306.936548][T12351] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 306.942685][T12351] ? arch_stack_walk+0xde/0x140 [ 306.947513][T12351] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 306.953487][T12351] ? preempt_count_add+0x66/0x150 [ 306.958519][T12351] ? unwind_next_frame+0x1aa9/0x1f30 [ 306.963778][T12351] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.969815][T12351] ? check_preemption_disabled+0x9e/0x330 [ 306.975504][T12351] ? __rcu_read_lock+0x50/0x50 [ 306.980238][T12351] ? debug_smp_processor_id+0x20/0x20 [ 306.985580][T12351] ? lo_release+0x1e0/0x1e0 [ 306.990054][T12351] blkdev_ioctl+0x8f7/0x2ce0 [ 306.994617][T12351] ? __kernel_text_address+0x93/0x110 [ 306.999958][T12351] ? unwind_get_return_address+0x48/0x90 [ 307.005558][T12351] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 307.010810][T12351] ? arch_stack_walk+0xf8/0x140 [ 307.015630][T12351] ? __rcu_read_lock+0x50/0x50 [ 307.020364][T12351] ? check_preemption_disabled+0x15a/0x330 [ 307.026141][T12351] ? avc_has_extended_perms+0x72a/0x1140 [ 307.031743][T12351] ? avc_has_extended_perms+0xb64/0x1140 [ 307.037349][T12351] ? avc_ss_reset+0x3a0/0x3a0 [ 307.041996][T12351] ? slab_free_freelist_hook+0xd0/0x150 [ 307.047512][T12351] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.053551][T12351] block_ioctl+0xb6/0xf0 [ 307.057764][T12351] ? blkdev_iopoll+0xf0/0xf0 [ 307.062328][T12351] do_vfs_ioctl+0x769/0x1720 [ 307.066887][T12351] ? selinux_file_ioctl+0x72f/0x990 [ 307.072066][T12351] ? ioctl_preallocate+0x250/0x250 [ 307.077185][T12351] ? __fget+0x37c/0x3c0 [ 307.081321][T12351] ? fget_many+0x20/0x20 [ 307.085549][T12351] ? debug_smp_processor_id+0x20/0x20 [ 307.090896][T12351] ? __x64_sys_pwrite64+0x1d9/0x240 [ 307.096192][T12351] ? security_file_ioctl+0xad/0xc0 [ 307.101286][T12351] __x64_sys_ioctl+0xd4/0x110 [ 307.105957][T12351] do_syscall_64+0xcb/0x150 [ 307.110439][T12351] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.116301][T12351] RIP: 0033:0x45e087 [ 307.120166][T12351] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.139757][T12351] RSP: 002b:00007f4b3a1f9a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.148138][T12351] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 307.156081][T12351] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.164031][T12351] RBP: 0000000000000000 R08: 0000000020000230 R09: 0000000000000000 [ 307.171980][T12351] R10: 00000000002011e0 R11: 0000000000000246 R12: 0000000000000002 [ 307.179935][T12351] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 307.203642][T12351] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="685a3d6e010000002c0000005c811fe90acfa9e01bae598ab143a08301704efe489947e96d2bf8bda20b29f4ef0efd8e7ea07a09fa695ddde656feefe9f9329ddf2790c11822e04a716ed4e5911edb83375fdc470e87"]) r3 = syz_io_uring_setup(0xc01, &(0x7f0000000140)={0x0, 0xbcac, 0x20, 0x2, 0x2a8}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) splice(r3, &(0x7f0000000200)=0x5, r2, &(0x7f0000000240)=0x2, 0x8000, 0x4) r4 = socket$inet_icmp(0x2, 0x2, 0x1) fcntl$setstatus(r4, 0x4, 0x4000) [ 307.240651][T12351] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 307.255691][T12368] tmpfs: Bad value for 'huge' [ 307.265977][T12351] F2FS-fs (loop0): invalid crc_offset: 0 [ 307.276779][T12351] F2FS-fs (loop0): invalid crc_offset: 0 [ 307.293534][T12351] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 307.305794][T12379] tmpfs: Unknown parameter 'hZ' [ 307.311895][T12380] tmpfs: Unknown parameter 'hZ' 03:00:44 executing program 0 (fault-call:2 fault-nth:26): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:44 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x500000000000000}, 0x0) 03:00:44 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffff000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:44 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8000000000000000}, 0x0) 03:00:44 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x1100, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x3, 0x3, 0x9, 0x6, 0x0, 0xfb, 0x40e0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000180), 0x2}, 0x88120, 0xa00000000000, 0x0, 0xc, 0x7a, 0x81, 0x9}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'dummy0\x00', {0x2, 0x0, @loopback}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x800000000000001]}, 0x8, 0x80800) close(r1) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000000)={@empty, @private, @empty}, &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="687567653d6e657665722c005a405008f9a2f802dc3ecbc592e40f29ed8ace442870588a7eb5bcbfd69ec7efcda48ede3d3353de1d9141767cd700801138201906327ec720f061d4312149086e4602945b183f0c79fd0cb94e90e6540bf63644e296df76760aeeb72b4bd523a5380bf69b59ba36414eb4e47d20c6d5cc30537244d5d9f21038651b06957fb71e6e21715b3e8c00000000000000000000000030dc5cae3f5e6a1cb479f0b2"]) 03:00:44 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:44 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe000000000000000}, 0x0) 03:00:44 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x600000000000000}, 0x0) 03:00:44 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x1400, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 307.438474][T12395] FAULT_INJECTION: forcing a failure. [ 307.438474][T12395] name failslab, interval 1, probability 0, space 0, times 0 03:00:44 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 307.482153][T12395] CPU: 1 PID: 12395 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 307.492329][T12395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.502376][T12395] Call Trace: [ 307.505664][T12395] dump_stack+0x1dd/0x24e [ 307.509995][T12395] ? devkmsg_release+0x11c/0x11c [ 307.514935][T12395] ? show_regs_print_info+0x12/0x12 [ 307.520134][T12395] ? terminate_walk+0x382/0x4f0 [ 307.524983][T12395] ? filename_parentat+0x2d4/0x860 [ 307.530083][T12395] should_fail+0x6fb/0x860 [ 307.534472][T12395] ? setup_fault_attr+0x3d0/0x3d0 [ 307.539465][T12395] ? kern_path_locked+0x590/0x590 [ 307.544459][T12395] ? __d_alloc+0x2a/0x6b0 [ 307.548760][T12395] should_failslab+0x5/0x20 [ 307.553236][T12395] kmem_cache_alloc+0x36/0x270 [ 307.557975][T12395] ? check_preemption_disabled+0x9e/0x330 [ 307.563665][T12395] __d_alloc+0x2a/0x6b0 [ 307.567794][T12395] d_alloc+0x45/0x1c0 [ 307.571745][T12395] __lookup_hash+0xc8/0x240 [ 307.576500][T12395] filename_create+0x20b/0x740 [ 307.581233][T12395] ? __check_object_size+0x2e5/0x3b0 [ 307.586489][T12395] ? kern_path_create+0x40/0x40 [ 307.591313][T12395] do_mkdirat+0xbc/0x330 [ 307.595525][T12395] ? vfs_mkdir+0x5f0/0x5f0 [ 307.599913][T12395] do_syscall_64+0xcb/0x150 [ 307.604390][T12395] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.610257][T12395] RIP: 0033:0x45d637 03:00:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x3000, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 307.614127][T12395] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.633701][T12395] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 307.642082][T12395] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 307.650023][T12395] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 307.657965][T12395] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 307.665906][T12395] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 307.673847][T12395] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:45 executing program 0 (fault-call:2 fault-nth:27): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:45 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x800000000000000}, 0x0) 03:00:45 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) 03:00:45 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x4000, 0x3300, 0xffffff7f}, 0x14}}, 0x0) [ 307.768717][T12430] FAULT_INJECTION: forcing a failure. [ 307.768717][T12430] name failslab, interval 1, probability 0, space 0, times 0 [ 307.781453][T12430] CPU: 0 PID: 12430 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 307.791590][T12430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.801754][T12430] Call Trace: [ 307.805042][T12430] dump_stack+0x1dd/0x24e [ 307.809370][T12430] ? devkmsg_release+0x11c/0x11c [ 307.814304][T12430] ? unwind_next_frame+0x1aa9/0x1f30 [ 307.819578][T12430] ? show_regs_print_info+0x12/0x12 [ 307.824753][T12430] ? arch_stack_walk+0xde/0x140 [ 307.829580][T12430] should_fail+0x6fb/0x860 [ 307.833971][T12430] ? setup_fault_attr+0x3d0/0x3d0 [ 307.838969][T12430] ? ebitmap_cmp+0x1c8/0x230 [ 307.843531][T12430] ? mls_compute_context_len+0x81b/0x850 [ 307.849135][T12430] ? context_struct_to_string+0x3de/0x820 [ 307.854869][T12430] should_failslab+0x5/0x20 [ 307.859354][T12430] __kmalloc+0x5f/0x2d0 [ 307.863485][T12430] context_struct_to_string+0x3de/0x820 [ 307.869002][T12430] ? security_bounded_transition+0x560/0x560 [ 307.874956][T12430] ? ebitmap_contains+0x6d8/0x780 [ 307.879949][T12430] ? hashtab_search+0x1bf/0x200 [ 307.884770][T12430] context_add_hash+0x13f/0x270 [ 307.889601][T12430] ? security_sid_to_context_inval+0x40/0x40 [ 307.895562][T12430] ? mls_context_isvalid+0x98/0x380 [ 307.900735][T12430] ? policydb_context_isvalid+0x1b6/0x400 [ 307.906431][T12430] security_compute_sid+0x11dc/0x1d50 [ 307.911865][T12430] ? __rcu_read_lock+0x50/0x50 [ 307.916612][T12430] ? security_transition_sid+0x90/0x90 [ 307.922060][T12430] ? avc_denied+0x1c0/0x1c0 [ 307.926543][T12430] ? avc_has_perm_noaudit+0x400/0x400 [ 307.932001][T12430] security_transition_sid+0x78/0x90 [ 307.937259][T12430] may_create+0x64b/0x9a0 [ 307.941560][T12430] ? show_sid+0x250/0x250 [ 307.945861][T12430] ? from_kgid+0x206/0x350 [ 307.950249][T12430] ? make_kgid+0x3a0/0x3a0 [ 307.954635][T12430] ? filename_create+0x4bd/0x740 [ 307.959560][T12430] ? generic_permission+0x13a/0x490 [ 307.964738][T12430] security_inode_mkdir+0xa6/0x130 [ 307.969823][T12430] vfs_mkdir+0x34e/0x5f0 [ 307.974036][T12430] do_mkdirat+0x1f0/0x330 [ 307.978333][T12430] ? vfs_mkdir+0x5f0/0x5f0 [ 307.982720][T12430] do_syscall_64+0xcb/0x150 [ 307.987197][T12430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 307.993059][T12430] RIP: 0033:0x45d637 [ 307.996930][T12430] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.016523][T12430] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 308.024904][T12430] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 308.032848][T12430] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 308.040795][T12430] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 308.048740][T12430] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 308.056682][T12430] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x6000, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:45 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:45 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xa00000000000000}, 0x0) 03:00:45 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffffff00000000}, 0x0) 03:00:45 executing program 0 (fault-call:2 fault-nth:28): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) unshare(0x26000400) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x140) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000a00)=0xea3e12c, 0x12) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@private0}}, &(0x7f0000000040)=0xe8) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@private0}}, &(0x7f00000008c0)=0xe8) sendmsg$unix(r3, &(0x7f0000000980)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000001c0)="641f3916a5d91a081778b72ba90fd752bafbdbe2e4273edb977c0b05a3b3fed484ccf5067ab0d3fbac8a54a116617f9d3f0dbaa8bd8aafbb25ff576a61dca6ac7a66781ce3a7bfa83c7c94c9698e40d04b2de142d30be282ebb5d8106f9b22d2137825a816726372ef7ffff722c2ad7156c313cf8a91a174e987406a86bedf49e1ff60bf61e3a4b8d3ab411dc5bc94e766e00e6370b719a447e3ea25795ddbd038dcab37510c8a081e93d85a3faf7d9e509f919f40e2555b461685d566e853409b91d3e734ea9a8823fda223860bf40ca7f46a11249f88e9e7", 0xd9}, {&(0x7f00000002c0)="47b968b36e26a7af596b89de92f4a8abf6d0a3c57d2c7a325ea577da72f8ac1f435fba81d26c59269ae7d279f5fcb34dce19c27e85302c114cc8bd8024e6efb0ce54c67c62c501a5bece8a2bb3af1a8dcb0a20803aba232d4fc3d019e46a53943c8742cdceaa6524fdcc7936b07bfd9720c5e724a1aa7faff58e4954ac71f2e8fed4f45848a2d3d6ed5f2bb235d7e15cce21ab004b41b8974608cec4bd229656071c34e95e53d4008a7aac20cb2fc650ed94f4cd3758fc4b34c0372dcd22f0f3648c6b7760be3aba", 0xc8}, {&(0x7f00000003c0)="4a80b310cdd8e539a2ee2a0d3ecc46d9e2a258abc5b330855724d46ad7311ee3c60820964b6b0b24565749814ca2bf5f98aa87cffa7d7c31aa878e164d437efc19d60458b9639b34eb3a9630aec874c5953fb8b375121d5cd883205f48140e33af1bf291f9ea8403c0d4d54ef16eca795b8b1433f89404ea7a5f77cdd8cd9e196048579dec8419f60de6e3331a4a7b3c24f5d22e600846b1e4e8044b65cd072d7aa58873048a1589daee3269b89d0f002febbb0ef8ad0e9e4c43dbc025880f9761cc649d9cf8", 0xc6}, {&(0x7f00000004c0)="542384b7fe2b3ac22f41dc840fcdf52fcc4048324819037a4f11c3adb786ba73f719fc918a3935d1202299272d93416f33b075e0f2f46874a962ec5a81a45db7a442000ec6ed0db10059c48069fab84d1b13d224b02fb8c861a150cd8760a2db1b37a4f469d292cc4e498a1d094b540655b708e32f46773244eba595b71264978b96f187045d2244fcc02ad1163f6c6cc7e6ce81ba537ce4281812f22490bbad7815c09f2a6a6a7ac6a1c8f7e23ec5", 0xaf}, {&(0x7f0000000580)="bc82db08529c592e37b9048910916fc988f17756870167e01fe4a6eccc65348e938d86d359cf189d7e2531ab0c2f106336a90b45e1a07251a7b76445965c464858039f6f88f62c9f08dc11708c247c70ec0cee4690bc47bb146bf0be52887455c842858957ee724acea88f304e30eaf06e97f61833e8e5a2a5ff34fa54891e5d3df95e046fe54d1db9baed15b8e219b35f6b6f3c4815e69c4aea2e75fda5597718ee6df19f4388e1", 0xa8}], 0x5, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r4]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, 0xffffffffffffffff}}}], 0x58, 0x4020005}, 0x40804) ioctl$EVIOCSKEYCODE_V2(r2, 0x80084503, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setattr(r5, &(0x7f00000009c0)={0x38, 0x5, 0x0, 0x0, 0x3, 0x8, 0x83, 0x6, 0x800, 0x5}, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xe000, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:45 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf00000000000000}, 0x0) [ 308.299477][T12457] FAULT_INJECTION: forcing a failure. [ 308.299477][T12457] name failslab, interval 1, probability 0, space 0, times 0 [ 308.312249][T12457] CPU: 1 PID: 12457 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 308.322404][T12457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.332451][T12457] Call Trace: [ 308.335747][T12457] dump_stack+0x1dd/0x24e [ 308.340073][T12457] ? devkmsg_release+0x11c/0x11c 03:00:45 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x3, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 308.345012][T12457] ? unwind_next_frame+0x1aa9/0x1f30 [ 308.350291][T12457] ? show_regs_print_info+0x12/0x12 [ 308.355485][T12457] ? arch_stack_walk+0xde/0x140 [ 308.360334][T12457] should_fail+0x6fb/0x860 [ 308.364748][T12457] ? setup_fault_attr+0x3d0/0x3d0 [ 308.369748][T12457] ? ebitmap_cmp+0x1c8/0x230 [ 308.374315][T12457] ? mls_compute_context_len+0x81b/0x850 [ 308.379929][T12457] ? context_struct_to_string+0x3de/0x820 [ 308.385652][T12457] should_failslab+0x5/0x20 [ 308.390134][T12457] __kmalloc+0x5f/0x2d0 [ 308.394372][T12457] context_struct_to_string+0x3de/0x820 [ 308.399892][T12457] ? security_bounded_transition+0x560/0x560 [ 308.405844][T12457] ? ebitmap_contains+0x6d8/0x780 [ 308.410839][T12457] ? hashtab_search+0x1bf/0x200 [ 308.415665][T12457] context_add_hash+0x13f/0x270 [ 308.420488][T12457] ? security_sid_to_context_inval+0x40/0x40 [ 308.426440][T12457] ? mls_context_isvalid+0x98/0x380 [ 308.431613][T12457] ? policydb_context_isvalid+0x1b6/0x400 [ 308.437311][T12457] security_compute_sid+0x11dc/0x1d50 [ 308.442657][T12457] ? __rcu_read_lock+0x50/0x50 [ 308.447396][T12457] ? security_transition_sid+0x90/0x90 [ 308.452871][T12457] ? avc_denied+0x1c0/0x1c0 [ 308.457354][T12457] ? avc_has_perm_noaudit+0x400/0x400 [ 308.462699][T12457] security_transition_sid+0x78/0x90 [ 308.467981][T12457] may_create+0x64b/0x9a0 [ 308.472286][T12457] ? show_sid+0x250/0x250 [ 308.476599][T12457] ? from_kgid+0x206/0x350 [ 308.481001][T12457] ? make_kgid+0x3a0/0x3a0 [ 308.485394][T12457] ? filename_create+0x4bd/0x740 [ 308.490302][T12457] ? generic_permission+0x13a/0x490 [ 308.495474][T12457] security_inode_mkdir+0xa6/0x130 [ 308.500561][T12457] vfs_mkdir+0x34e/0x5f0 [ 308.504776][T12457] do_mkdirat+0x1f0/0x330 [ 308.509079][T12457] ? vfs_mkdir+0x5f0/0x5f0 [ 308.513474][T12457] do_syscall_64+0xcb/0x150 [ 308.517966][T12457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.523838][T12457] RIP: 0033:0x45d637 [ 308.527705][T12457] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:00:45 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x2}, 0x0) 03:00:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xe803, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:45 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1100000000000000}, 0x0) 03:00:45 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 308.547282][T12457] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 308.555661][T12457] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 308.563607][T12457] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 308.571560][T12457] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 308.579505][T12457] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 308.587457][T12457] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:45 executing program 0 (fault-call:2 fault-nth:29): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 308.661905][T12487] FAULT_INJECTION: forcing a failure. [ 308.661905][T12487] name failslab, interval 1, probability 0, space 0, times 0 [ 308.679676][T12487] CPU: 1 PID: 12487 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 308.689851][T12487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.699902][T12487] Call Trace: [ 308.703191][T12487] dump_stack+0x1dd/0x24e 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x5, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x1400000000000000}, 0x0) [ 308.707524][T12487] ? devkmsg_release+0x11c/0x11c [ 308.712465][T12487] ? show_regs_print_info+0x12/0x12 [ 308.717667][T12487] ? context_struct_to_string+0x5d7/0x820 [ 308.723391][T12487] should_fail+0x6fb/0x860 [ 308.727808][T12487] ? setup_fault_attr+0x3d0/0x3d0 [ 308.732836][T12487] ? sidtab_context_to_sid+0x68/0x10c0 [ 308.738273][T12487] ? ext4_alloc_inode+0x1b/0x620 [ 308.743187][T12487] should_failslab+0x5/0x20 [ 308.747662][T12487] kmem_cache_alloc+0x36/0x270 [ 308.752417][T12487] ? set_qf_name+0x350/0x350 [ 308.756982][T12487] ext4_alloc_inode+0x1b/0x620 [ 308.761733][T12487] ? set_qf_name+0x350/0x350 [ 308.766295][T12487] new_inode_pseudo+0x64/0x240 [ 308.771027][T12487] new_inode+0x25/0x1d0 [ 308.775153][T12487] ? memset+0x1f/0x40 [ 308.779108][T12487] __ext4_new_inode+0x41a/0x5e50 [ 308.784022][T12487] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 308.789711][T12487] ? memset+0x1f/0x40 [ 308.793668][T12487] ? __dquot_initialize+0x227/0xd70 [ 308.798840][T12487] ? avc_has_perm+0x173/0x270 [ 308.803495][T12487] ? security_transition_sid+0x78/0x90 [ 308.808928][T12487] ext4_mkdir+0x41e/0x15d0 [ 308.813341][T12487] ? show_sid+0x250/0x250 [ 308.817643][T12487] ? from_kgid+0x206/0x350 [ 308.822033][T12487] ? ext4_symlink+0xf20/0xf20 [ 308.826677][T12487] ? filename_create+0x4bd/0x740 [ 308.831586][T12487] ? generic_permission+0x13a/0x490 [ 308.836753][T12487] ? security_inode_mkdir+0xed/0x130 [ 308.842023][T12487] vfs_mkdir+0x420/0x5f0 [ 308.846252][T12487] do_mkdirat+0x1f0/0x330 [ 308.850554][T12487] ? vfs_mkdir+0x5f0/0x5f0 [ 308.854945][T12487] do_syscall_64+0xcb/0x150 [ 308.859421][T12487] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 308.865286][T12487] RIP: 0033:0x45d637 [ 308.869150][T12487] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.888846][T12487] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 308.897241][T12487] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 308.905193][T12487] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:00:46 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3}, 0x0) [ 308.913141][T12487] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 308.921088][T12487] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 308.929047][T12487] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x800, 0x6, 0x8, 0x2}, 0x14) 03:00:46 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0xf401, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x6, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4}, 0x0) 03:00:46 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x3000000000000000}, 0x0) 03:00:46 executing program 0 (fault-call:2 fault-nth:30): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x7, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x4000000000000000}, 0x0) [ 309.165816][T12515] FAULT_INJECTION: forcing a failure. [ 309.165816][T12515] name failslab, interval 1, probability 0, space 0, times 0 [ 309.199195][T12515] CPU: 1 PID: 12515 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x8, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x9, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 309.209374][T12515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.219413][T12515] Call Trace: [ 309.222710][T12515] dump_stack+0x1dd/0x24e [ 309.227045][T12515] ? devkmsg_release+0x11c/0x11c [ 309.231982][T12515] ? show_regs_print_info+0x12/0x12 [ 309.237178][T12515] should_fail+0x6fb/0x860 [ 309.241592][T12515] ? setup_fault_attr+0x3d0/0x3d0 [ 309.246613][T12515] ? security_inode_alloc+0x32/0x1f0 [ 309.251893][T12515] should_failslab+0x5/0x20 [ 309.256395][T12515] kmem_cache_alloc+0x36/0x270 [ 309.261160][T12515] security_inode_alloc+0x32/0x1f0 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xa, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xf, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 309.266272][T12515] inode_init_always+0x37c/0x800 [ 309.271210][T12515] ? set_qf_name+0x350/0x350 [ 309.275807][T12515] new_inode_pseudo+0x7b/0x240 [ 309.280572][T12515] new_inode+0x25/0x1d0 [ 309.284724][T12515] ? memset+0x1f/0x40 [ 309.288710][T12515] __ext4_new_inode+0x41a/0x5e50 [ 309.293651][T12515] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 309.299371][T12515] ? memset+0x1f/0x40 [ 309.303352][T12515] ? __dquot_initialize+0x227/0xd70 [ 309.308586][T12515] ? avc_has_perm+0x173/0x270 [ 309.313268][T12515] ? security_transition_sid+0x78/0x90 [ 309.318725][T12515] ext4_mkdir+0x41e/0x15d0 [ 309.323151][T12515] ? show_sid+0x250/0x250 [ 309.327479][T12515] ? from_kgid+0x206/0x350 [ 309.331896][T12515] ? ext4_symlink+0xf20/0xf20 [ 309.336562][T12515] ? filename_create+0x4bd/0x740 [ 309.341473][T12515] ? generic_permission+0x13a/0x490 [ 309.346648][T12515] ? security_inode_mkdir+0xed/0x130 [ 309.352006][T12515] vfs_mkdir+0x420/0x5f0 [ 309.356228][T12515] do_mkdirat+0x1f0/0x330 [ 309.360529][T12515] ? vfs_mkdir+0x5f0/0x5f0 [ 309.364920][T12515] do_syscall_64+0xcb/0x150 [ 309.369399][T12515] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.375264][T12515] RIP: 0033:0x45d637 [ 309.379154][T12515] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.398783][T12515] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 309.407179][T12515] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x10, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x600, 0xffffff7f}, 0x14}}, 0x0) 03:00:46 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x8}, 0x0) 03:00:46 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x6000000000000000}, 0x0) 03:00:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}, 0x6}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/155, 0x9b}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4001, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x800, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000240)={{0x62, @multicast2, 0x4e24, 0x4, 'sh\x00', 0x15, 0x7, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x4e21, 0x3, 0x979b, 0xffff79ab, 0xde77}}, 0x44) write(r5, &(0x7f0000000340), 0x41395527) sendfile(r0, r4, &(0x7f0000000180)=0x4, 0x9) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/12]) [ 309.415131][T12515] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 309.423078][T12515] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 309.431037][T12515] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 309.438989][T12515] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:46 executing program 0 (fault-call:2 fault-nth:31): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x11, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x1100, 0xffffff7f}, 0x14}}, 0x0) 03:00:46 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf}, 0x0) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x60, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 309.549005][T12563] FAULT_INJECTION: forcing a failure. [ 309.549005][T12563] name failslab, interval 1, probability 0, space 0, times 0 [ 309.561775][T12563] CPU: 1 PID: 12563 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 309.571921][T12563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.581969][T12563] Call Trace: [ 309.585258][T12563] dump_stack+0x1dd/0x24e [ 309.589578][T12563] ? devkmsg_release+0x11c/0x11c 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x78, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xfc, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x220, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 309.594504][T12563] ? show_regs_print_info+0x12/0x12 [ 309.599698][T12563] ? memset+0x1f/0x40 [ 309.603674][T12563] should_fail+0x6fb/0x860 [ 309.608087][T12563] ? setup_fault_attr+0x3d0/0x3d0 [ 309.613105][T12563] ? memset+0x1f/0x40 [ 309.617082][T12563] ? ebitmap_cmp+0x1c8/0x230 [ 309.621667][T12563] ? mls_compute_context_len+0x81b/0x850 [ 309.627294][T12563] ? context_struct_to_string+0x3de/0x820 [ 309.633006][T12563] should_failslab+0x5/0x20 [ 309.637499][T12563] __kmalloc+0x5f/0x2d0 [ 309.641648][T12563] context_struct_to_string+0x3de/0x820 03:00:46 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x300, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:47 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x500, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 309.647189][T12563] ? security_bounded_transition+0x560/0x560 [ 309.653162][T12563] ? ebitmap_contains+0x6d8/0x780 [ 309.658176][T12563] ? hashtab_search+0x1bf/0x200 [ 309.663019][T12563] context_add_hash+0x13f/0x270 [ 309.667865][T12563] ? security_sid_to_context_inval+0x40/0x40 [ 309.673838][T12563] ? mls_context_isvalid+0x98/0x380 [ 309.679027][T12563] ? policydb_context_isvalid+0x1b6/0x400 [ 309.684746][T12563] security_compute_sid+0x11dc/0x1d50 [ 309.690114][T12563] ? security_transition_sid+0x90/0x90 [ 309.695569][T12563] ? _raw_spin_unlock_irq+0x4a/0x60 [ 309.700762][T12563] ? finish_task_switch+0x24f/0x540 [ 309.705960][T12563] ? __schedule+0xae9/0x1080 [ 309.710548][T12563] ? preempt_schedule_irq+0xeb/0x140 [ 309.715827][T12563] security_transition_sid+0x78/0x90 [ 309.721103][T12563] selinux_inode_init_security+0x4b7/0xaf0 [ 309.726902][T12563] ? selinux_inode_free_security+0x1d0/0x1d0 [ 309.732918][T12563] ? get_cached_acl+0x10e/0x130 [ 309.737747][T12563] security_inode_init_security+0x15f/0x3b0 [ 309.743615][T12563] ? posix_acl_create+0x15f/0x400 [ 309.748611][T12563] ? ext4_init_security+0x40/0x40 [ 309.753607][T12563] ? security_dentry_create_files_as+0xe0/0xe0 [ 309.759744][T12563] ? ext4_init_acl+0x275/0x330 [ 309.764499][T12563] ? prandom_u32+0x21b/0x240 [ 309.769081][T12563] __ext4_new_inode+0x4a10/0x5e50 [ 309.774087][T12563] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 309.779785][T12563] ? memset+0x1f/0x40 [ 309.783757][T12563] ? __dquot_initialize+0x227/0xd70 [ 309.788930][T12563] ? avc_has_perm+0x173/0x270 [ 309.793587][T12563] ? security_transition_sid+0x78/0x90 [ 309.799022][T12563] ext4_mkdir+0x41e/0x15d0 [ 309.803420][T12563] ? show_sid+0x250/0x250 [ 309.807722][T12563] ? from_kgid+0x206/0x350 [ 309.812109][T12563] ? ext4_symlink+0xf20/0xf20 [ 309.816757][T12563] ? filename_create+0x4bd/0x740 [ 309.821668][T12563] ? generic_permission+0x13a/0x490 [ 309.826839][T12563] ? security_inode_mkdir+0xed/0x130 [ 309.832094][T12563] vfs_mkdir+0x420/0x5f0 [ 309.836327][T12563] do_mkdirat+0x1f0/0x330 [ 309.840628][T12563] ? vfs_mkdir+0x5f0/0x5f0 [ 309.845017][T12563] do_syscall_64+0xcb/0x150 [ 309.849492][T12563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 309.855353][T12563] RIP: 0033:0x45d637 [ 309.859218][T12563] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.878797][T12563] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 309.887181][T12563] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 03:00:47 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8000000000000000}, 0x0) [ 309.895128][T12563] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 309.903072][T12563] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 309.911013][T12563] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 309.918954][T12563] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x800) r2 = syz_open_dev$hiddev(&(0x7f0000000240)='/dev/usb/hiddev#\x00', 0x5, 0x300) copy_file_range(r1, 0x0, r2, 0x0, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4$inet(r3, 0x0, &(0x7f0000000140), 0x80800) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x18100, 0x0) sendfile(r5, r6, &(0x7f00000001c0)=0x4, 0x7f) open(&(0x7f0000000280)='./file0\x00', 0x100, 0x18a) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="8148d2d7d6f894a3ab42928f0919fce45957131c6320bcea1132ace7b2f6229dd96615716089e18e81355f005c110627551ffc7c02847303ee844d6aef7915081b4b44cfd483e35a6ac1ab3c13b63d09ca1e256f2e9cdcf5a038743536003e2df08517947d9f2039101d6c405158f0601ba12ae21566adc40397a64b18122828ca6ef976db77a604c3e9f7"]) 03:00:47 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x5a0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:47 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x11}, 0x0) 03:00:47 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2100, 0xffffff7f}, 0x14}}, 0x0) 03:00:47 executing program 0 (fault-call:2 fault-nth:32): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:47 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x8004020000000000}, 0x0) 03:00:47 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x5c8, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r2, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth0\x00', 0x40}) [ 310.356592][T12604] FAULT_INJECTION: forcing a failure. [ 310.356592][T12604] name failslab, interval 1, probability 0, space 0, times 0 [ 310.361328][T12612] tmpfs: Unknown parameter 'HÒ×Öø”£«B’ üäYWc ¼ê2¬ç²ö"Ùfq`‰áŽ5_' [ 310.369363][T12604] CPU: 1 PID: 12604 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 310.387870][T12604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.397915][T12604] Call Trace: [ 310.401212][T12604] dump_stack+0x1dd/0x24e [ 310.405537][T12604] ? devkmsg_release+0x11c/0x11c [ 310.410469][T12604] ? mls_context_isvalid+0x98/0x380 [ 310.415667][T12604] ? show_regs_print_info+0x12/0x12 [ 310.420860][T12604] ? memset+0x1f/0x40 [ 310.424840][T12604] should_fail+0x6fb/0x860 [ 310.429254][T12604] ? setup_fault_attr+0x3d0/0x3d0 [ 310.434276][T12604] ? ebitmap_cmp+0x1c8/0x230 [ 310.438858][T12604] ? mls_compute_context_len+0x81b/0x850 [ 310.444477][T12604] ? context_struct_to_string+0x3de/0x820 [ 310.450180][T12604] should_failslab+0x5/0x20 [ 310.454663][T12604] __kmalloc+0x5f/0x2d0 [ 310.458813][T12604] context_struct_to_string+0x3de/0x820 [ 310.464337][T12604] ? security_bounded_transition+0x560/0x560 [ 310.470290][T12604] ? ext4_mkdir+0x41e/0x15d0 [ 310.474852][T12604] ? sidtab_search_force+0x139/0x330 [ 310.480109][T12604] security_sid_to_context_core+0x270/0x3a0 [ 310.485973][T12604] selinux_inode_init_security+0x703/0xaf0 [ 310.491775][T12604] ? selinux_inode_free_security+0x1d0/0x1d0 [ 310.497826][T12604] ? get_cached_acl+0x10e/0x130 [ 310.502681][T12604] security_inode_init_security+0x15f/0x3b0 [ 310.508553][T12604] ? posix_acl_create+0x15f/0x400 [ 310.513552][T12604] ? ext4_init_security+0x40/0x40 [ 310.518546][T12604] ? security_dentry_create_files_as+0xe0/0xe0 [ 310.524671][T12604] ? ext4_init_acl+0x275/0x330 [ 310.529406][T12604] ? prandom_u32+0x21b/0x240 [ 310.533969][T12604] __ext4_new_inode+0x4a10/0x5e50 [ 310.538968][T12604] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 310.544655][T12604] ? memset+0x1f/0x40 [ 310.548609][T12604] ? __dquot_initialize+0x227/0xd70 [ 310.553774][T12604] ? avc_has_perm+0x173/0x270 [ 310.558422][T12604] ? security_transition_sid+0x78/0x90 [ 310.563866][T12604] ext4_mkdir+0x41e/0x15d0 [ 310.568258][T12604] ? show_sid+0x250/0x250 [ 310.572561][T12604] ? from_kgid+0x206/0x350 [ 310.576946][T12604] ? ext4_symlink+0xf20/0xf20 [ 310.581592][T12604] ? filename_create+0x4bd/0x740 [ 310.586498][T12604] ? generic_permission+0x13a/0x490 [ 310.591668][T12604] ? security_inode_mkdir+0xed/0x130 [ 310.596919][T12604] vfs_mkdir+0x420/0x5f0 [ 310.601134][T12604] do_mkdirat+0x1f0/0x330 [ 310.605433][T12604] ? vfs_mkdir+0x5f0/0x5f0 [ 310.609833][T12604] do_syscall_64+0xcb/0x150 [ 310.614309][T12604] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.620171][T12604] RIP: 0033:0x45d637 [ 310.624039][T12604] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.643609][T12604] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 03:00:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2900, 0xffffff7f}, 0x14}}, 0x0) 03:00:48 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x14}, 0x0) 03:00:48 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe000000000000000}, 0x0) 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x600, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2b00, 0xffffff7f}, 0x14}}, 0x0) [ 310.651986][T12604] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 310.659929][T12604] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 310.667872][T12604] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 310.675833][T12604] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 310.683774][T12604] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x700, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:48 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x60}, 0x0) 03:00:48 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xe803000000000000}, 0x0) 03:00:48 executing program 0 (fault-call:2 fault-nth:33): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x900, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2c00, 0xffffff7f}, 0x14}}, 0x0) [ 310.845440][T12655] FAULT_INJECTION: forcing a failure. [ 310.845440][T12655] name failslab, interval 1, probability 0, space 0, times 0 [ 310.862243][T12655] CPU: 0 PID: 12655 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 310.872419][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.882467][T12655] Call Trace: [ 310.885757][T12655] dump_stack+0x1dd/0x24e [ 310.890063][T12655] ? devkmsg_release+0x11c/0x11c [ 310.894989][T12655] ? check_preemption_disabled+0x15a/0x330 [ 310.900765][T12655] ? show_regs_print_info+0x12/0x12 [ 310.905933][T12655] ? debug_smp_processor_id+0x20/0x20 [ 310.911285][T12655] should_fail+0x6fb/0x860 [ 310.915686][T12655] ? setup_fault_attr+0x3d0/0x3d0 [ 310.920686][T12655] ? kcalloc+0x2b/0x50 [ 310.924784][T12655] should_failslab+0x5/0x20 [ 310.929264][T12655] __kmalloc+0x5f/0x2d0 [ 310.933422][T12655] ? __rcu_read_lock+0x50/0x50 [ 310.938217][T12655] ? ext4_mkdir+0x41e/0x15d0 [ 310.942779][T12655] kcalloc+0x2b/0x50 [ 310.946643][T12655] ext4_find_extent+0x2bb/0xce0 [ 310.951464][T12655] ext4_ext_map_blocks+0x3a7/0x4690 [ 310.956654][T12655] ? ext4_ext_release+0x10/0x10 [ 310.961479][T12655] ? check_preemption_disabled+0x9e/0x330 [ 310.967165][T12655] ? debug_smp_processor_id+0x20/0x20 [ 310.972528][T12655] ? __down_read+0xf1/0x210 [ 310.977003][T12655] ? _raw_read_unlock+0x21/0x40 [ 310.981838][T12655] ? ext4_es_lookup_extent+0x415/0x900 [ 310.987267][T12655] ext4_map_blocks+0x48e/0x1eb0 [ 310.992090][T12655] ? prandom_u32+0x21b/0x240 [ 310.996651][T12655] ? ext4_issue_zeroout+0x160/0x160 [ 311.001835][T12655] ext4_getblk+0x10e/0x560 [ 311.006223][T12655] ? ext4_get_block_trans+0x5a0/0x5a0 [ 311.011565][T12655] ? memset+0x1f/0x40 [ 311.015533][T12655] ext4_bread+0x8e/0x390 [ 311.019748][T12655] ? ext4_getblk+0x560/0x560 [ 311.024333][T12655] ext4_append+0x153/0x2d0 [ 311.028722][T12655] ext4_mkdir+0x7f8/0x15d0 [ 311.033110][T12655] ? show_sid+0x250/0x250 [ 311.037411][T12655] ? from_kgid+0x206/0x350 [ 311.041798][T12655] ? ext4_symlink+0xf20/0xf20 [ 311.046441][T12655] ? filename_create+0x4bd/0x740 [ 311.051365][T12655] ? security_inode_mkdir+0xed/0x130 [ 311.056621][T12655] vfs_mkdir+0x420/0x5f0 [ 311.060854][T12655] do_mkdirat+0x1f0/0x330 [ 311.065153][T12655] ? vfs_mkdir+0x5f0/0x5f0 [ 311.069543][T12655] do_syscall_64+0xcb/0x150 [ 311.074028][T12655] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.079938][T12655] RIP: 0033:0x45d637 [ 311.083808][T12655] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.103409][T12655] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 311.111791][T12655] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 311.119822][T12655] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 311.127765][T12655] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 311.135722][T12655] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 311.143687][T12655] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 311.158560][T12655] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 311.166403][T12655] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 311.176236][T12655] F2FS-fs (loop0): invalid crc_offset: 0 [ 311.182056][T12655] F2FS-fs (loop0): invalid crc_offset: 0 [ 311.187768][T12655] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:48 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe0}, 0x0) 03:00:48 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xf401000000000000}, 0x0) 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xa00, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x2f00, 0xffffff7f}, 0x14}}, 0x0) 03:00:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/12]) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r2, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) 03:00:48 executing program 0 (fault-call:2 fault-nth:34): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:48 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x300}, 0x0) 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xf00, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 311.356466][T12676] FAULT_INJECTION: forcing a failure. [ 311.356466][T12676] name failslab, interval 1, probability 0, space 0, times 0 [ 311.385953][T12676] CPU: 1 PID: 12676 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 311.396132][T12676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.415035][T12676] Call Trace: [ 311.418330][T12676] dump_stack+0x1dd/0x24e [ 311.422649][T12676] ? devkmsg_release+0x11c/0x11c [ 311.427562][T12676] ? show_regs_print_info+0x12/0x12 [ 311.432734][T12676] should_fail+0x6fb/0x860 [ 311.437125][T12676] ? setup_fault_attr+0x3d0/0x3d0 [ 311.442120][T12676] ? kcalloc+0x2b/0x50 [ 311.446208][T12676] should_failslab+0x5/0x20 [ 311.450733][T12676] __kmalloc+0x5f/0x2d0 [ 311.454863][T12676] kcalloc+0x2b/0x50 [ 311.458730][T12676] ext4_find_extent+0x2bb/0xce0 [ 311.463551][T12676] ? ext4_ext_convert_to_initialized+0x1e50/0x1e50 [ 311.470025][T12676] ext4_ext_map_blocks+0x3a7/0x4690 [ 311.475209][T12676] ? ext4_ext_release+0x10/0x10 [ 311.480060][T12676] ? check_preemption_disabled+0x9e/0x330 [ 311.485756][T12676] ? debug_smp_processor_id+0x20/0x20 [ 311.491102][T12676] ? ext4_es_lookup_extent+0x415/0x900 [ 311.496535][T12676] ext4_map_blocks+0x982/0x1eb0 [ 311.501359][T12676] ? prandom_u32+0x21b/0x240 [ 311.505921][T12676] ? ext4_issue_zeroout+0x160/0x160 [ 311.511093][T12676] ext4_getblk+0x10e/0x560 [ 311.515484][T12676] ? ext4_get_block_trans+0x5a0/0x5a0 [ 311.520875][T12676] ? memset+0x1f/0x40 [ 311.524836][T12676] ext4_bread+0x8e/0x390 [ 311.529054][T12676] ? ext4_getblk+0x560/0x560 [ 311.533617][T12676] ext4_append+0x153/0x2d0 [ 311.538048][T12676] ext4_mkdir+0x7f8/0x15d0 [ 311.542437][T12676] ? show_sid+0x250/0x250 [ 311.546742][T12676] ? from_kgid+0x206/0x350 [ 311.551172][T12676] ? ext4_symlink+0xf20/0xf20 [ 311.555818][T12676] ? filename_create+0x4bd/0x740 [ 311.560725][T12676] ? security_inode_mkdir+0xed/0x130 [ 311.565981][T12676] vfs_mkdir+0x420/0x5f0 [ 311.570193][T12676] do_mkdirat+0x1f0/0x330 [ 311.574492][T12676] ? vfs_mkdir+0x5f0/0x5f0 [ 311.578901][T12676] do_syscall_64+0xcb/0x150 [ 311.583398][T12676] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.589280][T12676] RIP: 0033:0x45d637 [ 311.593146][T12676] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.612724][T12676] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 311.621114][T12676] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 311.629058][T12676] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 311.637002][T12676] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 311.645039][T12676] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 03:00:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}}, 0x0) 03:00:48 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x1100, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:49 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 03:00:49 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) 03:00:49 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2002, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 311.652983][T12676] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:49 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xfeffffff00000000}, 0x0) 03:00:49 executing program 0 (fault-call:2 fault-nth:35): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:49 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3302, 0xffffff7f}, 0x14}}, 0x0) 03:00:49 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x3f00, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x9, 0x4) 03:00:49 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1100}, 0x0) 03:00:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @val={0x3a, [0x2d, 0x3a, 0x30, 0x30, 0x0]}}}}]}) r2 = getpid() r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r3, &(0x7f00000001c0)='net/rt_acct\x00') sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$AUDIT_SET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfc, {0x40, 0x1, 0x1, r2, 0x8, 0xaee, 0x40, 0x101, 0x0, 0x6960}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x400c890}, 0x1) 03:00:49 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3303, 0xffffff7f}, 0x14}}, 0x0) 03:00:49 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4000, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:49 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) 03:00:49 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1400}, 0x0) [ 312.264618][T12717] FAULT_INJECTION: forcing a failure. [ 312.264618][T12717] name failslab, interval 1, probability 0, space 0, times 0 [ 312.329744][T12717] CPU: 1 PID: 12717 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 312.330836][T12735] tmpfs: Unsupported parameter 'mpol' [ 312.339931][T12717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.339934][T12717] Call Trace: [ 312.339955][T12717] dump_stack+0x1dd/0x24e [ 312.339964][T12717] ? devkmsg_release+0x11c/0x11c [ 312.339972][T12717] ? show_regs_print_info+0x12/0x12 [ 312.339982][T12717] ? ext4_evict_inode+0x1aa0/0x1aa0 [ 312.339991][T12717] ? _raw_spin_unlock+0x49/0x60 [ 312.340005][T12717] ? __dquot_alloc_space+0x29e/0xce0 [ 312.375189][T12735] tmpfs: Unsupported parameter 'mpol' [ 312.378262][T12717] ? vfs_mkdir+0x420/0x5f0 [ 312.378277][T12717] should_fail+0x6fb/0x860 [ 312.402524][T12717] ? setup_fault_attr+0x3d0/0x3d0 [ 312.407553][T12717] ? inode_io_list_move_locked+0x2bb/0x300 [ 312.413356][T12717] ? ext4_mb_new_blocks+0x423/0x28a0 [ 312.418634][T12717] should_failslab+0x5/0x20 [ 312.423117][T12717] kmem_cache_alloc+0x36/0x270 [ 312.427854][T12717] ext4_mb_new_blocks+0x423/0x28a0 [ 312.432948][T12717] ? kcalloc+0x2b/0x50 [ 312.436998][T12717] ? __kmalloc+0xe7/0x2d0 [ 312.441301][T12717] ? kcalloc+0x2b/0x50 [ 312.445344][T12717] ? ext4_mb_pa_callback+0xc0/0xc0 [ 312.450483][T12717] ? ext4_find_extent+0xa52/0xce0 [ 312.455479][T12717] ? ext4_inode_to_goal_block+0x263/0x370 [ 312.461171][T12717] ext4_ext_map_blocks+0x2e19/0x4690 [ 312.466428][T12717] ? ext4_ext_release+0x10/0x10 [ 312.471252][T12717] ? check_preemption_disabled+0x9e/0x330 [ 312.476944][T12717] ? debug_smp_processor_id+0x20/0x20 [ 312.482296][T12717] ? ext4_es_lookup_extent+0x415/0x900 [ 312.487729][T12717] ext4_map_blocks+0x982/0x1eb0 [ 312.492554][T12717] ? prandom_u32+0x21b/0x240 [ 312.497117][T12717] ? ext4_issue_zeroout+0x160/0x160 [ 312.502288][T12717] ext4_getblk+0x10e/0x560 [ 312.506678][T12717] ? ext4_get_block_trans+0x5a0/0x5a0 [ 312.512040][T12717] ? memset+0x1f/0x40 [ 312.515994][T12717] ext4_bread+0x8e/0x390 [ 312.520225][T12717] ? ext4_getblk+0x560/0x560 [ 312.524793][T12717] ext4_append+0x153/0x2d0 [ 312.529202][T12717] ext4_mkdir+0x7f8/0x15d0 [ 312.533590][T12717] ? show_sid+0x250/0x250 [ 312.537892][T12717] ? from_kgid+0x206/0x350 [ 312.542279][T12717] ? ext4_symlink+0xf20/0xf20 [ 312.546927][T12717] ? filename_create+0x4bd/0x740 [ 312.551856][T12717] ? security_inode_mkdir+0xed/0x130 [ 312.557122][T12717] vfs_mkdir+0x420/0x5f0 [ 312.561341][T12717] do_mkdirat+0x1f0/0x330 [ 312.565641][T12717] ? vfs_mkdir+0x5f0/0x5f0 [ 312.570030][T12717] do_syscall_64+0xcb/0x150 [ 312.574508][T12717] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.580372][T12717] RIP: 0033:0x45d637 [ 312.584264][T12717] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.603848][T12717] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 312.612226][T12717] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 312.620188][T12717] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:00:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x0, {0x80}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:49 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x6000, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 312.628149][T12717] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 312.636109][T12717] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 312.644052][T12717] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:50 executing program 0 (fault-call:2 fault-nth:36): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3304, 0xffffff7f}, 0x14}}, 0x0) 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0xffffffff00000000}, 0x0) 03:00:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) 03:00:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x5, r2, &(0x7f0000000040)=0x7, 0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x7800, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x80fe, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3305, 0xffffff7f}, 0x14}}, 0x0) [ 312.757583][T12771] FAULT_INJECTION: forcing a failure. [ 312.757583][T12771] name failslab, interval 1, probability 0, space 0, times 0 [ 312.770237][T12771] CPU: 0 PID: 12771 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 312.780373][T12771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.790453][T12771] Call Trace: [ 312.793749][T12771] dump_stack+0x1dd/0x24e [ 312.798077][T12771] ? devkmsg_release+0x11c/0x11c 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x2}, 0x0) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xa005, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 312.803014][T12771] ? show_regs_print_info+0x12/0x12 [ 312.808210][T12771] should_fail+0x6fb/0x860 [ 312.812623][T12771] ? setup_fault_attr+0x3d0/0x3d0 [ 312.817644][T12771] ? __es_insert_extent+0x7a4/0x1770 [ 312.822914][T12771] should_failslab+0x5/0x20 [ 312.827394][T12771] kmem_cache_alloc+0x36/0x270 [ 312.832172][T12771] __es_insert_extent+0x7a4/0x1770 [ 312.837260][T12771] ext4_es_insert_extent+0x42b/0x2f50 [ 312.842646][T12771] ? ext4_es_scan_clu+0x290/0x290 [ 312.847647][T12771] ? ext4_es_lookup_extent+0x415/0x900 [ 312.853083][T12771] ext4_map_blocks+0xe5c/0x1eb0 [ 312.857909][T12771] ? prandom_u32+0x21b/0x240 [ 312.862471][T12771] ? ext4_issue_zeroout+0x160/0x160 [ 312.867644][T12771] ext4_getblk+0x10e/0x560 [ 312.872033][T12771] ? ext4_get_block_trans+0x5a0/0x5a0 [ 312.877376][T12771] ? memset+0x1f/0x40 [ 312.881330][T12771] ext4_bread+0x8e/0x390 [ 312.885674][T12771] ? ext4_getblk+0x560/0x560 [ 312.890271][T12771] ext4_append+0x153/0x2d0 [ 312.894666][T12771] ext4_mkdir+0x7f8/0x15d0 [ 312.899073][T12771] ? show_sid+0x250/0x250 [ 312.903382][T12771] ? from_kgid+0x206/0x350 [ 312.907770][T12771] ? ext4_symlink+0xf20/0xf20 [ 312.912416][T12771] ? filename_create+0x4bd/0x740 [ 312.917324][T12771] ? security_inode_mkdir+0xed/0x130 [ 312.922594][T12771] vfs_mkdir+0x420/0x5f0 [ 312.926811][T12771] do_mkdirat+0x1f0/0x330 [ 312.931121][T12771] ? vfs_mkdir+0x5f0/0x5f0 [ 312.935523][T12771] do_syscall_64+0xcb/0x150 [ 312.940004][T12771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.945885][T12771] RIP: 0033:0x45d637 [ 312.949751][T12771] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.969327][T12771] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 312.977796][T12771] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 312.985740][T12771] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 312.993685][T12771] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 03:00:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x6000}, 0x0) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xc805, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 313.001629][T12771] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 313.009573][T12771] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 313.019728][T12771] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 313.027535][T12771] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 313.042408][T12771] F2FS-fs (loop0): invalid crc_offset: 0 [ 313.060109][T12771] F2FS-fs (loop0): invalid crc_offset: 0 [ 313.074644][T12771] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:50 executing program 0 (fault-call:2 fault-nth:37): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3306, 0xffffff7f}, 0x14}}, 0x0) 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3}, 0x0) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xfc00, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 313.170464][T12806] FAULT_INJECTION: forcing a failure. [ 313.170464][T12806] name failslab, interval 1, probability 0, space 0, times 0 [ 313.183140][T12806] CPU: 0 PID: 12806 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 313.193282][T12806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.203332][T12806] Call Trace: [ 313.206616][T12806] dump_stack+0x1dd/0x24e [ 313.210932][T12806] ? devkmsg_release+0x11c/0x11c [ 313.215844][T12806] ? memset+0x1f/0x40 [ 313.219805][T12806] ? show_regs_print_info+0x12/0x12 [ 313.224993][T12806] ? __es_remove_extent+0xed8/0x22c0 [ 313.230269][T12806] should_fail+0x6fb/0x860 [ 313.234660][T12806] ? setup_fault_attr+0x3d0/0x3d0 [ 313.239665][T12806] ? __es_insert_extent+0x7a4/0x1770 [ 313.244920][T12806] should_failslab+0x5/0x20 [ 313.249396][T12806] kmem_cache_alloc+0x36/0x270 [ 313.254144][T12806] __es_insert_extent+0x7a4/0x1770 [ 313.259233][T12806] ext4_es_insert_extent+0x42b/0x2f50 [ 313.264586][T12806] ? ext4_es_scan_clu+0x290/0x290 [ 313.269580][T12806] ? ext4_es_lookup_extent+0x415/0x900 [ 313.275008][T12806] ext4_map_blocks+0xe5c/0x1eb0 [ 313.279834][T12806] ? prandom_u32+0x21b/0x240 [ 313.284394][T12806] ? ext4_issue_zeroout+0x160/0x160 [ 313.289569][T12806] ext4_getblk+0x10e/0x560 [ 313.293968][T12806] ? ext4_get_block_trans+0x5a0/0x5a0 [ 313.299320][T12806] ? memset+0x1f/0x40 [ 313.303278][T12806] ext4_bread+0x8e/0x390 [ 313.307502][T12806] ? ext4_getblk+0x560/0x560 [ 313.312066][T12806] ext4_append+0x153/0x2d0 [ 313.316456][T12806] ext4_mkdir+0x7f8/0x15d0 [ 313.320869][T12806] ? show_sid+0x250/0x250 [ 313.325263][T12806] ? from_kgid+0x206/0x350 [ 313.329654][T12806] ? ext4_symlink+0xf20/0xf20 [ 313.334302][T12806] ? filename_create+0x4bd/0x740 [ 313.339210][T12806] ? security_inode_mkdir+0xed/0x130 [ 313.344465][T12806] vfs_mkdir+0x420/0x5f0 [ 313.348699][T12806] do_mkdirat+0x1f0/0x330 [ 313.353001][T12806] ? vfs_mkdir+0x5f0/0x5f0 [ 313.357387][T12806] do_syscall_64+0xcb/0x150 [ 313.361889][T12806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.367753][T12806] RIP: 0033:0x45d637 [ 313.371616][T12806] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.391302][T12806] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 313.399696][T12806] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 000000000045d637 [ 313.407639][T12806] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 313.415588][T12806] RBP: 00007f4b3a1f9ad0 R08: 0000000020000230 R09: 0000000000000000 [ 313.423535][T12806] R10: 00000000002011e0 R11: 0000000000000213 R12: 0000000020000000 [ 313.431486][T12806] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 313.441240][T12806] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 313.449049][T12806] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 313.458718][T12806] F2FS-fs (loop0): invalid crc_offset: 0 [ 313.470415][T12806] F2FS-fs (loop0): invalid crc_offset: 0 [ 313.478000][T12806] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:00:50 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{&(0x7f0000000040)=@tipc=@id, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000180)=""/246, 0xf6}, {&(0x7f0000000280)=""/128, 0x80}, {&(0x7f0000000300)=""/180, 0xb4}, {&(0x7f00000003c0)=""/1, 0x1}], 0x5, &(0x7f0000000480)=""/159, 0x9f}, 0x40000000}, {{&(0x7f0000000540)=@alg, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/220, 0xdc}], 0x1, &(0x7f0000000700)=""/192, 0xc0}, 0x3}, {{&(0x7f00000007c0)=@nfc, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000840)=""/38, 0x26}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/57, 0x39}, {&(0x7f0000000980)=""/205, 0xcd}, {&(0x7f0000000a80)=""/34, 0x22}], 0x5, &(0x7f0000000b40)=""/98, 0x62}, 0x81}, {{&(0x7f0000000bc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c40)=""/33, 0x21}], 0x1, &(0x7f0000000cc0)=""/3, 0x3}, 0x10000}, {{&(0x7f0000000d00)=@ax25={{0x3, @null}, [@rose, @remote, @rose, @bcast, @default, @rose, @remote, @netrom]}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000d80)=""/135, 0x87}, {&(0x7f0000000e40)=""/144, 0x90}, {&(0x7f0000000f00)=""/141, 0x8d}, {&(0x7f0000000fc0)=""/124, 0x7c}, {&(0x7f0000001040)=""/80, 0x50}], 0x5, &(0x7f0000001140)=""/162, 0xa2}}, {{&(0x7f0000001200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001280)=""/160, 0xa0}, {&(0x7f0000001340)=""/177, 0xb1}], 0x2, &(0x7f0000001440)=""/156, 0x9c}}, {{&(0x7f0000001500)=@generic, 0x80, &(0x7f0000001640)=[{&(0x7f0000001580)=""/54, 0x36}, {&(0x7f00000015c0)=""/78, 0x4e}], 0x2, &(0x7f0000001680)=""/4, 0x4}, 0x101}, {{&(0x7f00000016c0)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001740)=""/173, 0xad}, {&(0x7f0000001800)=""/91, 0x5b}, {&(0x7f0000001880)=""/71, 0x47}, {&(0x7f0000001900)=""/83, 0x53}, {&(0x7f0000001980)}, {&(0x7f00000019c0)=""/16, 0x10}, {&(0x7f0000001a00)=""/25, 0x19}, {&(0x7f0000001a40)=""/235, 0xeb}, {&(0x7f0000001b40)=""/4096, 0x1000}], 0x9, &(0x7f0000002c00)=""/176, 0xb0}, 0x3}, {{&(0x7f0000002cc0)=@nfc, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002d40)=""/19, 0x13}, {&(0x7f0000002d80)=""/161, 0xa1}, {&(0x7f0000002e40)=""/120, 0x78}], 0x3}, 0x5fd}, {{&(0x7f0000002f00)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f80)=""/19, 0x13}], 0x1, &(0x7f0000003000)=""/19, 0x13}}], 0xa, 0x40010041, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2030, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000003340)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000003300)={&(0x7f00000032c0)=@ipv6_getrule={0x1c, 0x22, 0x10, 0x70bd27, 0x7ff, {0xa, 0x20, 0x10, 0x6, 0x1f, 0x0, 0x0, 0x3, 0x1}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x4080) 03:00:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe000}, 0x0) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xfe80, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3308, 0xffffff7f}, 0x14}}, 0x0) 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4}, 0x0) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0xff00, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:50 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x5}, 0x0) 03:00:50 executing program 0 (fault-call:2 fault-nth:38): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x330a, 0xffffff7f}, 0x14}}, 0x0) 03:00:50 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x6}, 0x0) 03:00:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:50 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2, @loopback={0x0, 0xac141409}}, 0x1c) [ 313.625232][T12845] FAULT_INJECTION: forcing a failure. [ 313.625232][T12845] name failslab, interval 1, probability 0, space 0, times 0 03:00:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) [ 313.672339][T12845] CPU: 0 PID: 12845 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 313.682511][T12845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.692558][T12845] Call Trace: [ 313.695851][T12845] dump_stack+0x1dd/0x24e [ 313.700180][T12845] ? devkmsg_release+0x11c/0x11c [ 313.705106][T12845] ? _raw_spin_lock+0xa3/0x1b0 [ 313.709866][T12845] ? show_regs_print_info+0x12/0x12 [ 313.715084][T12845] should_fail+0x6fb/0x860 [ 313.719472][T12845] ? setup_fault_attr+0x3d0/0x3d0 [ 313.724467][T12845] ? vfs_submount+0xb0/0xb0 [ 313.728989][T12845] ? retain_dentry+0x275/0x360 [ 313.733728][T12845] ? ksys_mount+0x30/0xf0 [ 313.738029][T12845] should_failslab+0x5/0x20 [ 313.742511][T12845] __kmalloc_track_caller+0x5d/0x2c0 [ 313.747773][T12845] ? strnlen_user+0x185/0x210 [ 313.752425][T12845] strndup_user+0x73/0x150 [ 313.756819][T12845] ksys_mount+0x30/0xf0 [ 313.760957][T12845] __x64_sys_mount+0xb1/0xc0 [ 313.765525][T12845] do_syscall_64+0xcb/0x150 [ 313.770027][T12845] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.775893][T12845] RIP: 0033:0x460c6a [ 313.779758][T12845] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 313.799337][T12845] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 313.807722][T12845] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a 03:00:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) 03:00:51 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x330f, 0xffffff7f}, 0x14}}, 0x0) 03:00:51 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x8}, 0x0) 03:00:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x3, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:51 executing program 0 (fault-call:2 fault-nth:39): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 313.815679][T12845] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 313.823623][T12845] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 313.831566][T12845] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 313.839515][T12845] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 313.907691][T12879] FAULT_INJECTION: forcing a failure. [ 313.907691][T12879] name failslab, interval 1, probability 0, space 0, times 0 [ 313.920851][T12879] CPU: 1 PID: 12879 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 313.931025][T12879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.941072][T12879] Call Trace: [ 313.944365][T12879] dump_stack+0x1dd/0x24e [ 313.948692][T12879] ? devkmsg_release+0x11c/0x11c [ 313.953628][T12879] ? show_regs_print_info+0x12/0x12 [ 313.958819][T12879] should_fail+0x6fb/0x860 [ 313.963215][T12879] ? setup_fault_attr+0x3d0/0x3d0 [ 313.968212][T12879] ? ksys_mount+0x62/0xf0 [ 313.972559][T12879] should_failslab+0x5/0x20 [ 313.977037][T12879] __kmalloc_track_caller+0x5d/0x2c0 [ 313.982296][T12879] ? strnlen_user+0x185/0x210 [ 313.986964][T12879] strndup_user+0x73/0x150 [ 313.991371][T12879] ksys_mount+0x62/0xf0 [ 313.995507][T12879] __x64_sys_mount+0xb1/0xc0 [ 314.000074][T12879] do_syscall_64+0xcb/0x150 [ 314.004550][T12879] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.010412][T12879] RIP: 0033:0x460c6a [ 314.014278][T12879] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.033851][T12879] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 314.042234][T12879] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 314.050179][T12879] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:00:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) 03:00:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x4, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:51 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xa}, 0x0) [ 314.058122][T12879] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 314.066065][T12879] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 314.074009][T12879] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:51 executing program 0 (fault-call:2 fault-nth:40): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 314.137639][T12896] FAULT_INJECTION: forcing a failure. [ 314.137639][T12896] name failslab, interval 1, probability 0, space 0, times 0 [ 314.150372][T12896] CPU: 1 PID: 12896 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 314.160518][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.170566][T12896] Call Trace: [ 314.173857][T12896] dump_stack+0x1dd/0x24e [ 314.178273][T12896] ? devkmsg_release+0x11c/0x11c [ 314.183250][T12896] ? show_regs_print_info+0x12/0x12 [ 314.188473][T12896] should_fail+0x6fb/0x860 [ 314.192987][T12896] ? setup_fault_attr+0x3d0/0x3d0 [ 314.198078][T12896] ? copy_mount_options+0x59/0x320 [ 314.203212][T12896] should_failslab+0x5/0x20 [ 314.207693][T12896] kmem_cache_alloc_trace+0x39/0x290 [ 314.212998][T12896] copy_mount_options+0x59/0x320 [ 314.217911][T12896] ? ksys_mount+0x8f/0xf0 [ 314.222218][T12896] ksys_mount+0x97/0xf0 [ 314.226354][T12896] __x64_sys_mount+0xb1/0xc0 [ 314.230916][T12896] do_syscall_64+0xcb/0x150 [ 314.235420][T12896] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.241285][T12896] RIP: 0033:0x460c6a [ 314.245157][T12896] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.264737][T12896] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 314.273130][T12896] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 314.281092][T12896] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 314.289033][T12896] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 314.296974][T12896] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 314.304922][T12896] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@private2={0xfc, 0x2, [], 0x1}, @local, @private1, 0x1000, 0x8001, 0xe4c, 0x500, 0x8, 0x81800000}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x5, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:51 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3311, 0xffffff7f}, 0x14}}, 0x0) 03:00:51 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf}, 0x0) 03:00:51 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) 03:00:51 executing program 0 (fault-call:2 fault-nth:41): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:51 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x11}, 0x0) 03:00:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x6, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:51 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3314, 0xffffff7f}, 0x14}}, 0x0) [ 314.574519][T12914] FAULT_INJECTION: forcing a failure. [ 314.574519][T12914] name failslab, interval 1, probability 0, space 0, times 0 [ 314.597621][T12914] CPU: 1 PID: 12914 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 314.607806][T12914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.617855][T12914] Call Trace: 03:00:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x7, @loopback={0x0, 0xac141409}}, 0x1c) [ 314.621142][T12914] dump_stack+0x1dd/0x24e [ 314.625468][T12914] ? devkmsg_release+0x11c/0x11c [ 314.630417][T12914] ? show_regs_print_info+0x12/0x12 [ 314.635614][T12914] should_fail+0x6fb/0x860 [ 314.640029][T12914] ? setup_fault_attr+0x3d0/0x3d0 [ 314.645057][T12914] ? copy_mount_options+0x59/0x320 [ 314.650159][T12914] should_failslab+0x5/0x20 [ 314.654677][T12914] kmem_cache_alloc_trace+0x39/0x290 [ 314.659938][T12914] copy_mount_options+0x59/0x320 [ 314.664847][T12914] ? ksys_mount+0x8f/0xf0 [ 314.669164][T12914] ksys_mount+0x97/0xf0 [ 314.673293][T12914] __x64_sys_mount+0xb1/0xc0 [ 314.677880][T12914] do_syscall_64+0xcb/0x150 [ 314.682361][T12914] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.688227][T12914] RIP: 0033:0x460c6a [ 314.692092][T12914] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.711668][T12914] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:00:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) 03:00:52 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x14}, 0x0) 03:00:52 executing program 0 (fault-call:2 fault-nth:42): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80001, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000180)={0x3f0, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x6c, 0x11d, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x2f}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x41}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xa}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x99e2}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x85}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xf}]}]}, @NL80211_ATTR_TID_CONFIG={0x370, 0x11d, 0x0, 0x1, [{0x36c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x9}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0xac, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x60, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x16, 0x1, [0x5, 0xc, 0xc, 0xc, 0x16, 0x5, 0x24, 0xb, 0x48, 0x16, 0x36, 0x15, 0xf2aefdb21c1c6c03, 0xe, 0x9, 0xc, 0x24, 0x1b]}, @NL80211_TXRATE_HT={0x13, 0x2, [{0x5, 0x9}, {0x3, 0x9}, {0x1, 0x7}, {0x3, 0x3}, {0x4, 0x2}, {0x2, 0x9}, {0x4, 0x2}, {0x0, 0x3}, {0x0, 0x3}, {0x4, 0xa}, {0x4, 0x3}, {0x1, 0x5}, {0x1}, {0x3, 0x9}, {0x6, 0x3}]}, @NL80211_TXRATE_HT={0x27, 0x2, [{0x2, 0x2}, {0x6, 0x7}, {0x3, 0x9}, {0x1, 0x5}, {0x1, 0x8}, {0x4, 0x8}, {0x7, 0x9}, {0x4, 0x5}, {0x3, 0x4}, {0x6, 0x9}, {0x6, 0xa}, {0x5, 0x6}, {0x5, 0x8}, {0x4, 0x1}, {0x7, 0x6}, {0x4}, {0x4, 0x8}, {0x6, 0x9}, {0x5}, {0x7, 0x2}, {0x1, 0x7}, {0x1, 0x6}, {0x5, 0x1}, {0x4, 0x2}, {0x0, 0xa}, {0x3, 0x3}, {0x0, 0x8}, {0x5, 0x8}, {0x1, 0x2}, {0x3, 0x4}, {0x6}, {0x0, 0x8}, {0x3, 0xa}, {0x6, 0x8}, {0x3, 0x7}]}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x0, 0x5}, {0x5, 0x7}, {0x4, 0x2}, {0x0, 0x4}]}]}, @NL80211_BAND_60GHZ={0x48, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x13, 0x1, [0x9, 0x1, 0x4, 0x48, 0x36, 0x4, 0x4, 0x16, 0x60, 0x6, 0x9, 0x5, 0x16, 0x2f, 0x60]}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x1, 0x6}, {0x1, 0x2}, {0x6, 0x2}, {0x1, 0x2}, {0x1, 0x2}, {0x5, 0xa}, {}, {0x6}, {0x3, 0x7}, {0x1, 0x1}, {0x1, 0xa}, {0x3, 0x6}, {0x2, 0xa}, {0x7, 0x4}, {0x2, 0x4}, {}, {0x0, 0x3}, {0x0, 0x2}, {0x6, 0x1}, {0x4, 0xa}, {0x2}, {0x0, 0x7}, {0x0, 0x6}, {0x5, 0x5}, {0x1, 0x4}, {0x0, 0x3}, {0x3}, {0x1, 0x1}, {0x2, 0x5}, {0x1, 0x1}, {0x6, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x6}, {0x6, 0x9}, {0x0, 0x8}, {0x7, 0x1}, {0x2, 0x4}, {0x2, 0x1}, {0x4}, {0x7, 0x3}, {0x2, 0x7}, {0x3, 0x7}, {0x0, 0x6}]}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x284, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x5c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x5, 0x9, 0x81, 0xff, 0x1, 0x9, 0x81]}}, @NL80211_TXRATE_HT={0x1f, 0x2, [{0x7, 0x6}, {0x3, 0x6}, {}, {0x1}, {0x1}, {0x4, 0x2}, {0x2, 0x8}, {0x0, 0xa}, {0x3, 0x7}, {0x5, 0x9}, {0x0, 0x9}, {0x5, 0x1}, {0x0, 0x7}, {0x5, 0x6}, {0x6, 0x9}, {0x7, 0x4}, {0x1, 0x1}, {0x3, 0x3}, {0x0, 0x6}, {0x6}, {0x4, 0xa}, {0x1, 0x5}, {0x2, 0x4}, {0x4, 0x1}, {0x5, 0x1}, {0x6}, {0x2}]}, @NL80211_TXRATE_HT={0x1b, 0x2, [{0x1, 0x5}, {0x0, 0x8}, {0x1, 0x7}, {0x1, 0x2}, {0x7, 0x2}, {0x5, 0x7}, {0x1, 0x1}, {0x2, 0x9}, {0x1, 0x7}, {0x0, 0x3}, {0x0, 0x7}, {0x0, 0x4}, {0x7, 0x6}, {0x7, 0xa}, {0x1, 0x8}, {0x5}, {0x1, 0x7}, {0x5, 0x5}, {0x0, 0x9}, {0x7, 0x1}, {0x1, 0x7}, {0x1, 0xa}, {0x3, 0x7}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x50, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x7ff, 0x9, 0xffff, 0x7fff, 0x3ff0, 0x4, 0xa31]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x30, 0x1b, 0x692e8e4997f69ef5, 0x48, 0x16, 0x16, 0x1b, 0x30, 0x6, 0x36, 0x9, 0x16, 0x1b, 0xc, 0x6, 0x36, 0x3, 0x0, 0x16, 0x12, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3a26, 0x1, 0x5, 0xff81, 0x8, 0x0, 0x7, 0x9]}}]}, @NL80211_BAND_6GHZ={0x60, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x2}, {0x2, 0x5}, {0x2, 0x3}, {0x0, 0x2}, {0x1, 0x8}, {0x7, 0x3}, {0x6, 0x9}, {0x2, 0xa}, {0x4, 0x6}, {0x4, 0x9}, {0x0, 0x3}, {0x7, 0xa}, {0x3, 0x2}, {0x4, 0x9}, {0x6, 0x6}, {0x4, 0x8}, {0x3, 0x1}, {0x7, 0x8}, {0x4, 0x3}, {0x4, 0x4}, {0x4, 0x8}, {0x0, 0x7}, {0x1, 0x7}, {0x2, 0x8}, {0x7}, {0x7, 0x1}, {0x1, 0x3}, {0x0, 0x1}, {0x0, 0x9}, {0x6, 0x1}, {0x0, 0x4}, {0x2, 0x9}, {0x1, 0x5}]}, @NL80211_TXRATE_HT={0x1f, 0x2, [{0x1, 0x7}, {0x7, 0x8}, {0x1, 0x4}, {0x5, 0x6}, {0x5, 0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x1, 0x3}, {0x4, 0x9}, {0x3, 0x8}, {0x4}, {0x2, 0x8}, {0x5, 0x1}, {0x6, 0x9}, {0x3, 0x8}, {0x6, 0x8}, {0x3, 0x9}, {0x3, 0x6}, {0x7, 0x7}, {0x1, 0xa}, {0x5, 0x4}, {0x6, 0x6}, {0x4, 0x2}, {0x0, 0x1}, {0x1, 0x8}, {0x0, 0x9}, {0x1, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0xa0, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x6, 0x9}, {0x0, 0x1}, {0x6, 0x3}, {0x0, 0x9}, {0x3, 0x9}, {0x4, 0xa}, {0x6, 0xa}, {0x5, 0x7}, {0x7, 0x3}, {0x1, 0x7}, {0x5, 0x1}, {0x4, 0x7}, {0x1, 0x1}, {0x3, 0x4}, {0x2, 0x9}, {0x3}, {0x5, 0x8}, {0x1, 0x6}, {0x7, 0x7}, {0x0, 0x4}, {0x7, 0x1}, {0x1, 0x9}, {0x2, 0x2}, {0x2, 0x2}, {0x6, 0x7}, {0x7, 0x8}, {0x1}, {0x1, 0x9}, {}, {0x0, 0x7}, {0x0, 0x7}, {0x4, 0x5}, {0x7, 0xa}, {0x3, 0x9}, {0x2, 0x6}, {0x2}, {0x2, 0x9}, {0x1, 0xa}, {0x5, 0x1}, {0x5, 0x6}, {0x4, 0x3}, {0x6, 0x2}, {0x3, 0x3}, {0x1, 0x5}, {0x2, 0x6}, {0x1, 0x8}, {0x5, 0x7}, {0x1, 0x8}, {0x3, 0x9}, {0x1, 0x8}, {0x2, 0x1}, {0x3, 0x2}, {0x3, 0xa}, {0x5, 0x7}, {0x5, 0x6}, {0x4, 0x3}, {0x2, 0x8}, {0x4, 0x7}, {0x1, 0x6}, {0x1, 0x3}, {0x5, 0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x46, 0x2, [{0x4, 0x6}, {0x1, 0x6}, {0x0, 0x3}, {0x3, 0x1}, {0x0, 0x6}, {0x6, 0x3}, {0x1, 0xa}, {0x0, 0x4}, {0x4, 0x6}, {0x0, 0x2}, {0x6}, {0x6, 0x4}, {0x2, 0x4}, {0x7}, {0x5, 0x7}, {0x4}, {0x2}, {0x3, 0x3}, {0x2}, {0x3, 0x8}, {0x5, 0x8}, {0x4, 0x7}, {0x0, 0x6}, {0x0, 0x2}, {0x2, 0x2}, {0x4, 0x7}, {0x1, 0x8}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x2}, {0x0, 0x2}, {0x5, 0x2}, {0x4, 0x5}, {0x1, 0x5}, {0x0, 0x2}, {0x5, 0x8}, {0x1, 0x3}, {0x1, 0x5}, {0x1, 0x4}, {0x0, 0x1}, {0x0, 0x3}, {0x4, 0x3}, {0x3, 0x8}, {0x6, 0x8}, {0x7, 0x4}, {0x3, 0x5}, {0x5, 0xa}, {0x7}, {0x1, 0x8}, {0x7, 0x6}, {0x3, 0x6}, {0x7, 0x1}, {0x4}, {0x1, 0x6}, {0x7, 0x2}, {0x6, 0x5}, {0x7, 0x4}, {0x3, 0x3}, {0x3, 0x2}, {0x1, 0x3}, {0x4, 0x7}, {0x0, 0xa}, {0x3, 0x8}, {0x3, 0x1}, {0x5, 0x4}, {0x2, 0x1}]}]}, @NL80211_BAND_2GHZ={0x68, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x7, 0x1800, 0x8, 0x3ff, 0xddeb, 0x7, 0x3]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x8, 0x3f, 0x0, 0x4, 0x5, 0xfff, 0x8]}}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0x16, 0x9, 0x24, 0x3f, 0x16, 0x9, 0x48, 0x9, 0x48, 0x12, 0x18, 0x1, 0xc, 0x18, 0x36, 0xb, 0x30, 0x1, 0x16, 0x48, 0x3, 0x36, 0x16, 0x0, 0x3, 0x48, 0x5, 0xc, 0x1b, 0x4, 0x24]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x6c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0xce49, 0xffff, 0x401, 0xc22, 0x3, 0x8000]}}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x0, 0x2}, {0x0, 0x3}, {0x4, 0x2}, {0x0, 0x4}]}, @NL80211_TXRATE_HT={0x4a, 0x2, [{0x1, 0x4}, {0x4}, {0x2, 0x8}, {0x3}, {0x3, 0x5}, {0x4, 0x3}, {0x4, 0x7}, {0x7, 0x1}, {0x5, 0x1}, {0x2, 0x2}, {0x0, 0xa}, {0x3, 0x9}, {0x7, 0xa}, {0x4, 0x1}, {0x7, 0x9}, {0x5, 0xa}, {0x1, 0x7}, {0x1, 0x5}, {0x1, 0x5}, {0x5, 0x6}, {0x0, 0x2}, {0x7}, {0x0, 0x1}, {0x3, 0x6}, {0x7, 0x2}, {0x2, 0x2}, {0x0, 0x6}, {0x2, 0x5}, {0x7, 0x5}, {0x2}, {0x6, 0x4}, {0x2, 0x2}, {0x3, 0x5}, {0x3}, {0x1, 0x2}, {0x2, 0x8}, {0x0, 0xa}, {0x4}, {0x4}, {0x7, 0x9}, {0x4, 0x2}, {0x1}, {0x1, 0x6}, {0x0, 0x7}, {0x1, 0x2}, {0x2, 0x4}, {0x1}, {0x7, 0x9}, {0x4, 0x2}, {0x6, 0x1}, {0x3, 0x1}, {0x5, 0x8}, {0x2, 0x1}, {0x5, 0xa}, {}, {0x1, 0x4}, {0x0, 0xa}, {0x0, 0xb}, {}, {0x5, 0x8}, {0x0, 0x6}, {0x7, 0x8}, {0x3, 0x7}, {0x7, 0x7}, {0x7, 0x1}, {0x1, 0x2}, {0x7, 0x2}, {0x6, 0x1}, {0x0, 0x3}, {0x0, 0x6}]}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x200}]}]}]}, 0x3f0}, 0x1, 0x0, 0x0, 0x480d0}, 0x20000000) r4 = getgid() setregid(0xee00, r4) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2062, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r4, @ANYBLOB="2c6673636f6e5c6578743d75d1fa40c1723e303ea7a755a293"]) [ 314.720054][T12914] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 314.728003][T12914] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 314.735949][T12914] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 314.743894][T12914] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 314.751835][T12914] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:52 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x8, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3330, 0xffffff7f}, 0x14}}, 0x0) 03:00:52 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x30}, 0x0) 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10124a8, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 03:00:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x8000000}, 0x0) 03:00:52 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x9, @loopback={0x0, 0xac141409}}, 0x1c) [ 314.838555][T12942] FAULT_INJECTION: forcing a failure. [ 314.838555][T12942] name failslab, interval 1, probability 0, space 0, times 0 [ 314.877291][T12942] CPU: 1 PID: 12942 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 314.887476][T12942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.897526][T12942] Call Trace: [ 314.900815][T12942] dump_stack+0x1dd/0x24e [ 314.905148][T12942] ? devkmsg_release+0x11c/0x11c [ 314.910087][T12942] ? show_regs_print_info+0x12/0x12 [ 314.915298][T12942] should_fail+0x6fb/0x860 [ 314.919742][T12942] ? setup_fault_attr+0x3d0/0x3d0 [ 314.924796][T12942] ? alloc_fs_context+0x61/0x650 [ 314.929704][T12942] should_failslab+0x5/0x20 [ 314.934178][T12942] kmem_cache_alloc_trace+0x39/0x290 [ 314.939457][T12942] alloc_fs_context+0x61/0x650 [ 314.944192][T12942] ? _raw_read_unlock+0x21/0x40 [ 314.949026][T12942] ? get_fs_type+0x410/0x490 [ 314.953591][T12942] do_mount+0x12d1/0x2660 [ 314.957896][T12942] ? copy_mount_string+0x30/0x30 [ 314.962814][T12942] ? copy_mount_options+0x1f8/0x320 [ 314.967979][T12942] ? copy_mount_options+0x230/0x320 [ 314.973147][T12942] ? __sanitizer_cov_trace_pc+0xd/0x50 [ 314.978572][T12942] ? copy_mount_options+0x293/0x320 [ 314.983758][T12942] ksys_mount+0xc2/0xf0 [ 314.987885][T12942] __x64_sys_mount+0xb1/0xc0 [ 314.992445][T12942] do_syscall_64+0xcb/0x150 [ 314.996920][T12942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.002782][T12942] RIP: 0033:0x460c6a [ 315.006646][T12942] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.026232][T12942] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:00:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3360, 0xffffff7f}, 0x14}}, 0x0) 03:00:52 executing program 4: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="a879d8a535db8f03a46c68e4852af4ea583b8c17ada7623894e6363880fad51a8e851298330dc324c3280594e3728aad9d06f16cf6b1dec181dd75aef7b00f861006e8f3851222d8b5075694e1ce77e6940061b1cb9a4f51331b0f29a84b8065ca4d2f380fae326ae948d14c033c5e58367ba8ff0071045db416369e20a64b00daca7c0464f20383bb98ee0fed6ae7d54f782fccf3fdbcab166a8547914dbb2b796873ba725c4c24e6897c1dfd42", 0xae, 0xfffffffffffffff9) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) 03:00:52 executing program 0 (fault-call:2 fault-nth:43): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:52 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x60}, 0x0) [ 315.034624][T12942] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 315.042580][T12942] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 315.050534][T12942] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 315.058477][T12942] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 315.066437][T12942] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:52 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x33e0, 0xffffff7f}, 0x14}}, 0x0) 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/129, 0x81}, {&(0x7f00000002c0)=""/141, 0x8d}, {&(0x7f0000000380)=""/166, 0xa6}], 0x4, 0x1f, 0xffffffff) 03:00:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x11000000}, 0x0) [ 315.147115][T12980] FAULT_INJECTION: forcing a failure. [ 315.147115][T12980] name failslab, interval 1, probability 0, space 0, times 0 [ 315.186786][T12980] CPU: 1 PID: 12980 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x700, 0x10, 0x4, 0xfffffe8d, {{0x1c, 0x4, 0x1, 0x2, 0x70, 0xe18, 0x0, 0x40, 0x4, 0x0, @rand_addr=0x64010101, @private=0xa010102, {[@timestamp_prespec={0x44, 0x2c, 0x89, 0x3, 0xc, [{@rand_addr=0x64010100, 0x4}, {@loopback, 0x8001}, {@empty, 0x4}, {@multicast1, 0x1b6}, {@rand_addr=0x64010101, 0xd96}]}, @timestamp={0x44, 0x1c, 0x8b, 0x0, 0x0, [0x7, 0x8, 0x3, 0x5604, 0x5, 0x9]}, @noop, @ssrr={0x89, 0x7, 0x7a, [@remote]}, @ra={0x94, 0x4}, @rr={0x7, 0x7, 0x92, [@broadcast]}]}}}}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:52 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xf, @loopback={0x0, 0xac141409}}, 0x1c) [ 315.196962][T12980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.207011][T12980] Call Trace: [ 315.210299][T12980] dump_stack+0x1dd/0x24e [ 315.214625][T12980] ? devkmsg_release+0x11c/0x11c [ 315.219557][T12980] ? show_regs_print_info+0x12/0x12 [ 315.224744][T12980] should_fail+0x6fb/0x860 [ 315.229134][T12980] ? setup_fault_attr+0x3d0/0x3d0 [ 315.234129][T12980] ? refcount_inc_not_zero_checked+0x1a6/0x280 [ 315.240254][T12980] ? legacy_init_fs_context+0x4d/0xc0 [ 315.245600][T12980] should_failslab+0x5/0x20 [ 315.250075][T12980] kmem_cache_alloc_trace+0x39/0x290 [ 315.255335][T12980] legacy_init_fs_context+0x4d/0xc0 [ 315.260511][T12980] alloc_fs_context+0x510/0x650 [ 315.265332][T12980] do_mount+0x12d1/0x2660 [ 315.269637][T12980] ? copy_mount_string+0x30/0x30 [ 315.274546][T12980] ? copy_mount_options+0x59/0x320 [ 315.279644][T12980] ? copy_mount_options+0x293/0x320 [ 315.284830][T12980] ksys_mount+0xc2/0xf0 [ 315.289037][T12980] __x64_sys_mount+0xb1/0xc0 [ 315.293601][T12980] do_syscall_64+0xcb/0x150 [ 315.298109][T12980] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.304027][T12980] RIP: 0033:0x460c6a [ 315.307901][T12980] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.327476][T12980] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 315.335860][T12980] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a 03:00:52 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe0}, 0x0) 03:00:52 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x10, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3c00, 0xffffff7f}, 0x14}}, 0x0) 03:00:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x14000000}, 0x0) [ 315.343809][T12980] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 315.351764][T12980] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 315.359880][T12980] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 315.367831][T12980] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:52 executing program 0 (fault-call:2 fault-nth:44): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:52 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1f4}, 0x0) 03:00:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) open(&(0x7f0000000040)='./file0\x00', 0x20400, 0x112) 03:00:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x6c00, 0xffffff7f}, 0x14}}, 0x0) [ 315.458438][T13019] FAULT_INJECTION: forcing a failure. [ 315.458438][T13019] name failslab, interval 1, probability 0, space 0, times 0 [ 315.479835][T13019] CPU: 1 PID: 13019 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 315.490013][T13019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.500065][T13019] Call Trace: [ 315.503373][T13019] dump_stack+0x1dd/0x24e [ 315.507679][T13019] ? devkmsg_release+0x11c/0x11c [ 315.512591][T13019] ? show_regs_print_info+0x12/0x12 [ 315.517763][T13019] should_fail+0x6fb/0x860 [ 315.522162][T13019] ? setup_fault_attr+0x3d0/0x3d0 [ 315.527154][T13019] ? vfs_parse_fs_string+0x180/0x290 [ 315.532408][T13019] should_failslab+0x5/0x20 [ 315.536879][T13019] __kmalloc_track_caller+0x5d/0x2c0 [ 315.542132][T13019] kmemdup_nul+0x27/0xa0 [ 315.546343][T13019] vfs_parse_fs_string+0x180/0x290 [ 315.551422][T13019] ? logfc+0x720/0x720 [ 315.555463][T13019] ? __module_put_and_exit+0x20/0x20 [ 315.560719][T13019] ? alloc_fs_context+0x524/0x650 [ 315.565713][T13019] do_mount+0x13e3/0x2660 [ 315.570011][T13019] ? copy_mount_string+0x30/0x30 [ 315.574922][T13019] ? apic_timer_interrupt+0xa/0x20 [ 315.580016][T13019] ? copy_mount_options+0x1e8/0x320 [ 315.585182][T13019] ? copy_mount_options+0x293/0x320 [ 315.590347][T13019] ksys_mount+0xc2/0xf0 [ 315.594486][T13019] __x64_sys_mount+0xb1/0xc0 [ 315.599044][T13019] do_syscall_64+0xcb/0x150 [ 315.603515][T13019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.609374][T13019] RIP: 0033:0x460c6a [ 315.613239][T13019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.632809][T13019] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 315.641187][T13019] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 315.649129][T13019] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x11, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000000)=0x7, 0x4) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRESDEC=r1, @ANYBLOB="d859d547e87ae1f5102d207749bf55dd10559878e50be1ddc31035a5c32c67fbbac981f25fd829d632d3dc6d44ff550f687b49cbf3d376e75cf216d5db02ba33d2f068980488328052ba5edc1c7f99a99dd68825c1ee4ca19912684bf0b0eef0f3492de63b7da2107452b9b91735454bee1c54415fb634075a9c8210f8f174a69eedba31d80f6cd9ce94028f3e2d8cbf1c18ad03e47ceb925447c9a078ea42715ba5b7d489f307f90be06fc33f299d", @ANYRES16=r0, @ANYRES64, @ANYRES64]) 03:00:53 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x300}, 0x0) 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x60, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:53 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) [ 315.657083][T13019] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 315.665022][T13019] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 315.672980][T13019] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:53 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3e8}, 0x0) 03:00:53 executing program 0 (fault-call:2 fault-nth:45): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="487567653dea63445550ff2db431fdb16e65767e722c00"]) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r2, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5db497ceaf3e1b11a5d63a2b7035dc69fa701f3b46fe701880800a7d38dccd4b3e8014aa15c96968359533ce2c5ffdd5f0d3297018bd7c025150940cdead92eb1e6bc6ba45eecf067b32425b6000b2f376ef9172426ae7fa97e5a84ef4dc540bbf5dd458ffcb75724135bd32fa04db6d6a75aedda7ab6e8501fc94e209dc3b2525ae24c954255d3247ca9c1b9525ce68179a52a87333aa2b0a8c1baa6ba6160c6d2018e67bac5402d0d89c5f798b8d1a87b0dc3306f546c61724530d9f4b6f0ee68677c7b261de5afa02d708a8ec979791de8f4831cc354ba453bc253e2435207f25494a594d4e5be39902358d362cb318ad965b7e7480a5ca5b6fe74e101c400c77392ee4419ad788f494230487811046f21f0f9665dfbaa9e94ed305a02e3fa47039e67dde19f89c8f1741aad752cdfe458ddf54e8fc10ff79b5", 0x1b9}], 0x3) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r3 = accept$inet(r1, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000002c0)={{0x2f, @multicast2, 0x4e20, 0x0, 'lc\x00', 0x4, 0x5, 0x42}, {@local, 0x4e23, 0x2, 0x4, 0x9, 0xffffffff}}, 0x44) dup(r2) [ 315.713395][T13037] tmpfs: Unknown parameter '' [ 315.720046][T13041] tmpfs: Unknown parameter '' [ 315.759892][T13051] FAULT_INJECTION: forcing a failure. [ 315.759892][T13051] name failslab, interval 1, probability 0, space 0, times 0 [ 315.773176][T13051] CPU: 1 PID: 13051 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 315.783336][T13051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.793384][T13051] Call Trace: [ 315.796679][T13051] dump_stack+0x1dd/0x24e [ 315.799010][T13057] tmpfs: Unknown parameter 'Huge' [ 315.801001][T13051] ? devkmsg_release+0x11c/0x11c [ 315.801019][T13051] ? __kmalloc_track_caller+0x20e/0x2c0 [ 315.816463][T13051] ? show_regs_print_info+0x12/0x12 [ 315.821643][T13051] ? ksys_mount+0xc2/0xf0 [ 315.825951][T13051] ? do_syscall_64+0xcb/0x150 [ 315.830604][T13051] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.836643][T13051] should_fail+0x6fb/0x860 [ 315.841031][T13051] ? setup_fault_attr+0x3d0/0x3d0 [ 315.846027][T13051] ? avc_has_perm_noaudit+0x30c/0x400 [ 315.851370][T13051] ? getname_kernel+0x55/0x2f0 [ 315.856103][T13051] should_failslab+0x5/0x20 [ 315.860577][T13051] kmem_cache_alloc+0x36/0x270 [ 315.865317][T13051] getname_kernel+0x55/0x2f0 [ 315.869881][T13051] kern_path+0x19/0x40 [ 315.873938][T13051] blkdev_get_by_path+0xc7/0x2e0 [ 315.878845][T13051] ? __blkdev_get+0x19c0/0x19c0 [ 315.883667][T13051] ? selinux_perf_event_write+0x100/0x100 [ 315.889369][T13051] ? vfs_parse_fs_param+0x2d3/0x440 [ 315.894540][T13051] ? kill_f2fs_super+0x330/0x330 [ 315.899448][T13051] mount_bdev+0x49/0x340 [ 315.903661][T13051] ? cap_capable+0x23f/0x280 [ 315.908223][T13051] legacy_get_tree+0xde/0x170 [ 315.912878][T13051] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 315.918937][T13051] vfs_get_tree+0x85/0x260 [ 315.923334][T13051] do_mount+0x18ab/0x2660 [ 315.927639][T13051] ? copy_mount_string+0x30/0x30 [ 315.932548][T13051] ? copy_mount_options+0x59/0x320 [ 315.937629][T13051] ? copy_mount_options+0x293/0x320 [ 315.942814][T13051] ksys_mount+0xc2/0xf0 [ 315.946943][T13051] __x64_sys_mount+0xb1/0xc0 [ 315.951504][T13051] do_syscall_64+0xcb/0x150 [ 315.955982][T13051] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.961867][T13051] RIP: 0033:0x460c6a [ 315.965759][T13051] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.985334][T13051] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 315.993714][T13051] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 316.001660][T13051] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x78, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:53 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x500}, 0x0) 03:00:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x2}}, 0x14}}, 0x0) 03:00:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x3}}, 0x14}}, 0x0) [ 316.009603][T13051] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 316.017546][T13051] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 316.025488][T13051] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:53 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x600}, 0x0) 03:00:53 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x60000000}, 0x0) 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xfc, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:53 executing program 0 (fault-call:2 fault-nth:46): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x4}}, 0x14}}, 0x0) 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x220, @loopback={0x0, 0xac141409}}, 0x1c) [ 316.130116][T13081] FAULT_INJECTION: forcing a failure. [ 316.130116][T13081] name failslab, interval 1, probability 0, space 0, times 0 [ 316.143863][T13081] CPU: 0 PID: 13081 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 316.154023][T13081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.164073][T13081] Call Trace: [ 316.167423][T13081] dump_stack+0x1dd/0x24e [ 316.171738][T13081] ? devkmsg_release+0x11c/0x11c [ 316.176665][T13081] ? show_regs_print_info+0x12/0x12 [ 316.181844][T13081] should_fail+0x6fb/0x860 [ 316.186236][T13081] ? setup_fault_attr+0x3d0/0x3d0 [ 316.191233][T13081] ? vfs_parse_fs_string+0x180/0x290 [ 316.196489][T13081] should_failslab+0x5/0x20 [ 316.200980][T13081] __kmalloc_track_caller+0x5d/0x2c0 [ 316.206255][T13081] kmemdup_nul+0x27/0xa0 [ 316.210473][T13081] vfs_parse_fs_string+0x180/0x290 [ 316.215557][T13081] ? logfc+0x720/0x720 [ 316.219596][T13081] ? __module_put_and_exit+0x20/0x20 [ 316.224853][T13081] ? alloc_fs_context+0x524/0x650 [ 316.229849][T13081] do_mount+0x13e3/0x2660 [ 316.234273][T13081] ? copy_mount_string+0x30/0x30 [ 316.239189][T13081] ? copy_mount_options+0x59/0x320 [ 316.244276][T13081] ? copy_mount_options+0x293/0x320 [ 316.249450][T13081] ksys_mount+0xc2/0xf0 [ 316.253578][T13081] __x64_sys_mount+0xb1/0xc0 [ 316.258138][T13081] do_syscall_64+0xcb/0x150 [ 316.262612][T13081] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.268586][T13081] RIP: 0033:0x460c6a [ 316.272560][T13081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.292143][T13081] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 316.300546][T13081] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 316.308513][T13081] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 316.316459][T13081] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 03:00:53 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe0000000}, 0x0) [ 316.324404][T13081] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 316.332347][T13081] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 316.608540][T13083] tmpfs: Unknown parameter 'Huge' 03:00:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:53 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x300, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:53 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xa00}, 0x0) 03:00:53 executing program 0 (fault-call:2 fault-nth:47): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x5}}, 0x14}}, 0x0) 03:00:53 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x500, @loopback={0x0, 0xac141409}}, 0x1c) [ 316.683063][T13109] FAULT_INJECTION: forcing a failure. [ 316.683063][T13109] name failslab, interval 1, probability 0, space 0, times 0 [ 316.713461][T13109] CPU: 1 PID: 13109 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 316.723639][T13109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.733679][T13109] Call Trace: [ 316.736956][T13109] dump_stack+0x1dd/0x24e [ 316.741259][T13109] ? devkmsg_release+0x11c/0x11c [ 316.746169][T13109] ? show_regs_print_info+0x12/0x12 [ 316.751343][T13109] should_fail+0x6fb/0x860 [ 316.755735][T13109] ? setup_fault_attr+0x3d0/0x3d0 [ 316.760746][T13109] ? selinux_sb_alloc_security+0x4f/0x200 [ 316.766449][T13109] should_failslab+0x5/0x20 [ 316.770930][T13109] kmem_cache_alloc_trace+0x39/0x290 [ 316.776188][T13109] ? down_write+0xd8/0x150 [ 316.780573][T13109] selinux_sb_alloc_security+0x4f/0x200 [ 316.786100][T13109] security_sb_alloc+0x50/0xb0 [ 316.790845][T13109] alloc_super+0x140/0x760 [ 316.795236][T13109] ? mount_bdev+0x340/0x340 [ 316.799707][T13109] sget+0x20e/0x4e0 [ 316.803491][T13109] ? test_bdev_super+0x40/0x40 [ 316.808227][T13109] mount_bdev+0xe3/0x340 [ 316.812440][T13109] ? kill_f2fs_super+0x330/0x330 [ 316.817367][T13109] legacy_get_tree+0xde/0x170 [ 316.822017][T13109] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 316.828053][T13109] vfs_get_tree+0x85/0x260 [ 316.832440][T13109] do_mount+0x18ab/0x2660 [ 316.836759][T13109] ? copy_mount_string+0x30/0x30 [ 316.841679][T13109] ? copy_mount_options+0x59/0x320 [ 316.846760][T13109] ? copy_mount_options+0x293/0x320 [ 316.851927][T13109] ksys_mount+0xc2/0xf0 [ 316.856067][T13109] __x64_sys_mount+0xb1/0xc0 [ 316.860631][T13109] do_syscall_64+0xcb/0x150 [ 316.865106][T13109] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.870972][T13109] RIP: 0033:0x460c6a [ 316.874838][T13109] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.894514][T13109] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 316.902907][T13109] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 316.910856][T13109] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 316.918806][T13109] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 03:00:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x6}}, 0x14}}, 0x0) 03:00:54 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) 03:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000009280)=[{{&(0x7f0000000000)=@ethernet={0x1, @dev={[], 0x3e}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000200)="8c3fc28a3fd6bef162e4d36d4f3078cee0fe1426c1657b84a81b93b6da6142741d75f65244253e981919caad187f6497afd9fa2215c937ee0895944c0b677df2cc5db58c3507413b923db91591297546557a7ba09479e93e3ca4ddac9e81dd7a74443117a00217d86d2328381508df1505954d81af1725c2a1f173ddaafa24db7b506f7902ff75673f4419c848573d55d6ff8bcda0ad0bec94c6f580c3569837eb28db9f57b0cf664d125bc8877695c99baf71b8656de150f16844fa692f9747a1336d", 0xc3}, {&(0x7f0000000300)="7e91980792d1190b78ec2a65044eaf146fb3f8b38c4290dcd523efc3113b4ba692514640a16be117a0685a08c73634e4e6aa893b8144223c6e5c8b2907592ff1d15618f4cf0ab539bcb9c9300fd508acc33d1b2ff7909f6e4778423f4a7ca85bbb0a32e64d1dbc862e8c439fd70a2ccea177c271cae9b4248d2ee5350986eb986709ef78a8a7d4d45ef921c8be3dbdb0aee642ce368e12e238052c3c", 0x9c}, {&(0x7f00000003c0)="7623576f25602a19db4e2c4dea0ff3dcac3fc0b27477fbb918142f643554536eb1389a1c277e78b1733d3c13964b4966a7b3d686b8dc9e31da30b579ed6c704f45e28139ae7b3e07159a2eaf72eb293970be02c60cfc286b0dc607fcb5729c6d79c66a75b73381390f8846b2e0591eca696af5f11e8f64d77192f103afd41ca7667ec3e7d95900cbeefff0b16c33c27e986b743c655dbe853975a3fee29b3b028db7e3ba5d90fadaf6178b7ef5f04c193da17f3fbbb4d77d85c24ff23bb4c8a6de923261c73b413fb7ccb091eebbe5d0ad45fb23cf79e9528a9bb7867ff78e71812cc471fa71e39ed3c553f1ea15fb2b8d7f5d27ae45be7a9298ea38e453fe137ca110cb153b85be8bb11904416286e3f6fbcc7303dc3b8b5c4f6ba2443d53191b4559d97d218f7b1eafc4085f58691ca69f402fb07389e02e660999c8228151a7e346133fcd6ec8a621852ff58e01e938841f26175b1ac0e4900e72e08a8c2b51492c25ee4412304b23cc9d493621b4933b675ce895dd7b5deb049622595b1d40d1aa390ae6d8bc14c769f08f7c75cab3531289dc591d576326ea198d0b8a734efeb987972de4341b021052709a00a9e3dea94bff58fa29723db8bfeb59d9e898cf3a86d28ccde2f672edb4f68a64dc15928be6ed0acc1d14dabb73a229078c62fe8c3cc53b5b00f2f2f6bf4eb52c72572bb600f23f93200d2f507df94444edfce49852f7b9fbf8364c621b47b95baad7b9bd40c2a6dbf40604f3594ebd0be29e012db2c02099c1b9e8930b7a4f6a22ba9307caa367d6b3084d95fa11e6430283af8fb8d857485e3e2888d25806e031008d261449cde05101ac4dc2f37309770c8ff445874275f50e11def882d467386b11fba09ce9fe2a457a8801f19ca5d3ec2e588eda614751b89afe9ae26bbf03d117576316a917b2ecca41565dffcbbaac358cc1051b6033f192d55d04b645fb3250c4c584bf99f2fb22ffc5c40d087a6f4e53617f809109b2b8ef98180a2443538dc1581636643f75e7769c891331cb5ad979643feed5ba1c058c28a765a89ff7d73af19983c0947595f1d85b89b8ba2a3be51390ec198a3798ae456d455d828f7b245307ce3681ba853e9ed00f60393d091a857b03e593c1b696e115348db8289a24fc2ca972235c706f120208c0eb4f7e04023c8705aa785b3f7f0f0d11d081e1d73efe96d2dbf629606c26571a5cd310583b50cf8c6c021ab08e257a560072d903f721c2cdd1457ab42236d6ed837dc5eb79c22c651dda0982e75a5ab94b732d5e0802644175b7c234c6bd63bc67e6172a97308571bdd372f936e55ee8033fcc5ba41d1fdb45c3ff05b6e890e297445e75b20996efe415c7bf48fbe6c19cb6d7aa3cf75dfbeff4b64f11f274276514fdc7cc3feef37906ded80518fedde51e6d6255be5c4639e0071e1a3332d8f69db15fd11f7eb7db9786e861735c329c99d487e46b8a168cc7f0579a9f472ef552c902f6e0d4b02cf4a73a352834ec76ccc8f0088f4720fa6e7d2a390a1cc0f0b7b4d7e93887aa65155330bdc82f7b1716057ef741cfa712d9c9d839c354fa0eb51934cef7f98e09275844a8258101f11591501ae12cc39270f574fe4c305cf501a08cc318ba8387b9d8852e71a1f9a816858f8ee098e06d6a6f0494ce9d5c3dfb03e536604bc27f9d3f958dcd9d95bcf40c2c746511d6736a2034eda9efd6f5933311e3e69215ea57a2f8878a4fc94da940fe129c08c1345e9ec9b1e5a0b9aeca0e66859d3eaeb38af350317db277f87c6c61dd7556a0e04347353505e4b98a1aab2f67701f8f38cbb56523d0792e0a466276e491b970b2fe964bad6e7cd6a1eaed350664fd94c844b7886fa4c38a82831322182d441425146a44c3495aff464f452d2ff764023dfffaa5d29eb3bcb8c8f2a6716cf81c1ffa062b8b4681e9a553fc190fe35b5adfaa880e467f21d78a89d96d3b9c2e7a498f66f614b786bb3efb3016cc1dc7bf844906d78933dae9848f269cb86c8bdee0f829eb8837328c48271b87cb16e64358c9aaee14a1df6ede1fd241e3cd3327b8a9feabbbe4e7f969cd4d487c43f17dd88e1aaf596800f049cf962b33a5b4635a640cc42f5e78d2471294bac03f01259b3ee186230b9fec2cdc291768e9deb46676beba0e953a195e10a7049262e71474523c7d1a93eee8f856764f4c874c655337d16b4db4b3107368bc15807b809d867abedf479330188d7895292d6360ed897f93c97be4cc289f804ae0610720be1a04ec705dc2263f1db4b19beb8b3e9ee2451d14d90477a95a6928c3c6ef24d4b3a6e3689ee7791d827adae1849afae721cf0223ae8dae172a548ccf4d104d5b6ef1c99c1f49a4fc8707eb39a5143ec12d017440e2a6f3cba139670fd53f17f0f33328e6b4b8b24aa34da612c89bbef91d22a2e3b2699ced23f853a039dd5c3c4f11eea6d13ce5d80ffa1e682aa80784eece0219fb8ac4f5f1e95b5a44ee283c1d33ea3b36d05720e9cca2239b591f6f8f0b437654c168dce730c15f78b4ac5e52a50b4b87ab2bf70d6b3c1b69a3385a7e95872a27096ae47b2c685936de9d36bcf53058f69d7d01b9b467cfb1883cb5fc24436fc4e84ddfe39cde1bc66b1214777cd0c5472d5bc5a50ce12755b8a8010162392275417bb159c9e3190c0a1b766998aa40e5523382efbcdf0c557f5fd7d24af190d61abe1a086fafe046822ec32cd95872c77118309a3d76a5fd9224726fd9358de57949eb4ccd341a310a167bc028a746df9562ac9393dfd87ccd5b37ebfa5fb42d35a1589da066b5f624f59da3a530e862d3402677fd668f3c6858a5cbb608035e58f824d34010eb85f2678bcef5a68c4cd6744985188613c6cfcc0934461f7372695d9f4704536e39819c78383af95718343047fcb972a52cacdc65085051c62f6ea595c55bb3b85f5b2111e99944e19227fab3b312579bfeeb42f89bc8ba5fb76e70c4144d6e270eb3add8f4deaa677b64d47abb0cb34705a51f788a3536de5b8146b9d54c11738a3dcd1c543edf54b663297408cf192fa1586f6fae3a04f7f49863a6eaacd16087d51de6519129392306334b939d99dc44a76fb842c0a3d356949ab8b0e51dd8ac1e503f775c49924f0cb8679ffe6920a66fa8f9c0de3d804b563ebc15bc57a5c7a0a20fddce62fd9ca65224d27782eb4ff00b176da5c8df7610ea6a7a04cdb4a089c3c7969453274c0254802bbf79b6ffc4b3958d4235883240a11682ec275b53debfbf3c5d2dd32b25b301eced161c09f77ab99adb1dabc1b42154405059ab8388e82b76f6f722031547b48fe3c3de6166e00fe0ebb2406c571deb9c0e6c9c892727602b8503f1300e8e5990b67109812e223de33755ff28e441bcaa7d6c2cfcb104711d9581bd898679542411687b16c3984bb2dc68075e2047a5a170294f0e3e8e2c64df93fa95729a1c5a527b83e8c48b1a0a9400ee2270e617e872b95f4856bbe7341285ea01b15940c5910d7391551f52a1b07fbed4cbbd11308317752bc2e511916b1f22d37ed82e79f5c8ac2527777459cf5e38185bc15a948258c96d7eb338f1c61890508f4184a8f1a9ca47c4fc33a0cc2239a196eda14d60d9aac0164074bd3588141e95ec35a962c5a329af15aaba9b125b09cd7d51a153a30d40ff951e5fcbc3807f02db9951a6df9614db2eb3e27ff9557afb391af4a0ce49d0c9f2ae058678fe16e1a0a2042222336b55305ca74bf9765b8dadd65ee425aa8b1da65b77dd8f6d33592b3d751c2398d8d9160cc26f5cb12c2e1c3eafd8cac7d638d481e5f6bdfb2e58d3fab8f90b273a513629f51f3e4a690536ae6ac8798936969c80f9b5fb7c53f6eaa1249bbabe0568ce451c6bf0e16b476b2e8dd60497b15e72739181053522fd40c5e149b3b8cd9a31944c966314bb3624c3da4a555082430dc8068308813f4ca755f82d5f9c70dd36f6f8949a6e24eb48f169c6ca56e99704738fe95f714559fd8d9fb680801a680f0153fab5d46b5d5201f101088c44cbbef2781c99ae015cf150c9243ef3fd4c1702c428aa3a91696d569d1e5a7f1fd7a2c44835a74658cf7b65d96e56ce0d845e7ff13a0fab3fb7f7238f2b7d76112b156dbad41f259b0f8e9ac475002fa106d740369589502154ad6b8dcfc8a621c1048d02b9925fc673e3ab2172b72b2db748b46d97372a524c446f092495954f62b162aff9106f59f85ec765dbd2fab859d380b84eb4246094b3951e90c8b76f09d9ecdb9e287a68e49b903ff5511b5a49aa244ff988635569a3e1360a99c1f65cc79573e091f88655537f1556cd3d140e5d185d06722af225638fc8b28ca7f22bc46b087e7e9b207e2b0e82773a5bab09eaa5240ea8333c036b2e10b72cab42007aa16c721d8952438bcbf7baae2db4bc3f18c1d755b209c3b785d321edac72b18408c9dcb9fbcad2ee154847e9a1441c0a43916a6e48dc4671c9c6b31916e44df91bb47a4f2d402beda18554cfa72527d6cf09cc2f28f2196030ed6882412e3625370cfa160852fdeefe126d65dc814f75e70cfc0f0d5b008ed84cf0bb88f41f654d3be5964d0cf3ee48922c5801eb7fbe58ada86f6cfc06cebcab8a865e185eb54b5e47bbe77d8bd128b14229a19086159c5b374f54a984234b6909bd28532eca8f1b0df5b7bb29645bda4232d4132d85bcb5b22bfafdbc03be478fe004d4b18e56cd5983c521ddc7872b8270920fc070e1d6f95feae38bacb8e5860eebb91e7d7b272944ca317cc94c77c36ff9467394c637cf86d8bf770766154c0a3071c184459cca5895feb018b0b332bd5d8aa9a77d9c634adee612c358dc129dd33948909a2df0dcb4a1dad310804633347ef44f4d156a4eba8a932ddfa28de11372e4194feca37b3185e46929542c5b7f8e4639ea5fb635a772bf538c1d6ced85b42414be1cb34368dcd6656846a2bec90d529f56884a90d50504167e7310a26a2c01ed792dcdcd0a7b8ba09332acb92765f09febe1e798dd3c2af75ff779e84a6295131856ed9715c78d3044bd2034ebdf9be3382652384803ff996e8070d78136c48f34b5c62184f25c84689a1a8a985ea73246a4817de359d572e618f33ae09be9ad4b7fff74c7cf7f1becae37a268356343cd75af8c9934d55e0057108566550e0908a7c8c70d2e13f61cbce38a1f3fced9e24c0ef54bbb623fe16240dab0884e14b0fb1aff6b5c122046cf166d49dc24eeb5a9d62419b80c08e3c7acf27634f895bcc032f3a1fe165e249950bb95d0b2fcdb26415584f43c6a3c4b41d9ce30134e02c618b2ff7a60d59bd3060e31a2bf68a5298bfb1fae4e9f2b1b60b9a316076d54d1d877d100f3a59cd343b7c89103d0f7455df5c023dbbb8efbb4eee85e8a27abe6f7f0ebda2a290acc5d566a9ad87c201466faf21556657c3579a8290b45e81e1dbda0443bf1472b9ad971c301f51d3ddd25321e8ac11930f32079a3f613f3908e6069fb6f2bfd23284195ca66b1860883ce531d4bf2ca84f66b5ff597fff35edb6a6648c39930394289e59894dbcabebad2c3c4ca32d13eac9ce75ed1cd25a73bd0d4172882ea6a63d2d2ea71f930eba95a04e2f609cb05cddd022767599f15dfeea05696815980a737a539eac9bfcd8b470bb318057d7470a4812d5754f898a67fd654350dec1d6f099e6377d890ea6611f798113db8b2ae70d9487a3259959605409dfa815e1f724f943797665483bf1f9202642dd2482ab45729acab52bc9ac08e7aa58d050fbb57337d2e977487621b9e62aa2eb64676", 0x1000}, {&(0x7f0000000080)="8fae9699d457ced7c87b", 0xa}, {&(0x7f00000013c0)="f442b67baa9c7169ad92a6485270bb3c3d439ec4ee6e4b0aab2fada92b554b", 0x1f}], 0x5, &(0x7f0000001480)=[{0x38, 0x108, 0x3, "678af59d108cf85f7ac9dcf61ae41baa7b3788a52b563f917b3719b113b369475c07b1a9190b"}, {0x30, 0x6, 0x1, "4e9b6b59373545060314ca28b9b32dec9a69025e9eb36dd41e45afea1d22d361"}, {0x38, 0x104, 0x1, "15c56c87d52bf481b0912c9efb47f4d1669653543ac70f223957fbc3c0fc303745a79cca91b775"}, {0xa0, 0x107, 0x4, "05657c53ab328488c91cb9b66c69e8036cbb1ef8aa026526cc65c6c8302d2214b6b3c09119c2526b99e64a27dba98679fef04583b70fca5151942564907c9a3ba0141a18c280ca894d85eb84c9f754bf25cf777c2568a7d90cd89759bde9ff6d49e17e9399eeee43fef305d4a194e5b4a8006c538964ba50ffcb95a669ba42e5cb681218d050715652f37b26"}, {0x1010, 0x103, 0x4, "f86c014e5461847a9a55d75258ee5b8e87a28a1adc0c117b60eda5b7fae177397e8e8cd2da2b59f993a32a92b52358eabd9144f3681a1e5a27c87e3e3b6dc62c97ebe59c64de377e0902802bb44a6e5c2ec43a76c432d612b38c3859181e6c984ecfd63f59948e21d872157bb3f314a1e0522130342a20e27732e60a47735c76385166cb43210f0c7fc7f10d11b57903820c5e719fb092effaad5cc267d9979637c20f1a13a17cd3412df8d4447b91a32d395af0f79d3d2167004d97ad2c567b3278fa27cd65b7238debc5656d71fe84881a29a0102fbf126dbf8cdce3e2c16b3618f8551db280f3517f74377a11e18f7475a83348c43ede42a4016acabc468796e80f35fe0ad566766f3511c8d57530bc17604404d00c20eb030269f8a140cb49c3dfcdb8a1fa80c66b99d565a30dcc855b3bd4b16dc258cd0bca6837db8ae3df5ba2d0ebc895e8361ee3625ae6e9fdb43c163bdbf5596f98ba163395fba7750dd7dd45922156e69238698f0e396c0704a7060b855f98a3ec002cc8a9a08d7da43ff0d59d08496591615009dda98552f075c0ac03cfcb3721443379e23ca9fbb41338fd6de6a464569001b0fc2ee9bacf8fbed3db0fd2b318e9c9c366fcf180f28b831317a929c5ad6c65c9eb585fdb04fb94b4dd3acf9f27f9a6e45d177463ab547fef69405ce22724724d6dfca513d7cfff437cf95b076c5070babb3121abe0c509cd97d941d919e2b91c838d3d1010e46dfabac80129269b3fad8dee3e1d09c8f0f89dc1b90c8e34e481fd92902f0f47b7e5a25a36e0346f6b0529ee07c71d8426d17b1a28043e9974dc80072bfc39324f1ef6bca430c6790fef5cccf6e269b68b6a9d606ff4c46f0c6f21f08a2e1898f2ba51a39db7d437ef63718673eb96907ae037df592b461793e1ec028a4b0fe83359efbc62702e0fa08b77a3d51d3dd512258b3a4dd539a170e7c45098d7bfee89fd2f44f857f18fe919ce68c63789a6ce17686931aa262e647db67a9dd1d313bbb73e388ca0f79476ad3d47cf982c6ac7d8d5ed464e661906b799d71af77009c61fa0fc30569083e6d9270593dcd6e7ea12e4f8cc9d346524b4354dd54fe53ab5016bd4faa8d9677a6649d9096f890b0b3b6072ec8f14eb00ac1f8c72c637336900275dd327cb1b11c864befec748089dd498234d8760a9a7e5170a7e7b3dc5b76f95baf96aa940033e99c78ec2e449684d28cb221a9ffc8ad7c5d1fcb2facafb8f3baa815bf7c7d9051062bcd3f2f866ab5c4c2364226e0c55067e52f846d1642b4ef9372737117fcabd76e56aa6b2b81f2184a4998e1171fa7260a18a5a5411ee1be4aae68f50d505e36bc6a6af9d341b1f862b8b905a1ff8523b70cbde8fb25477000d1dab52f60d1d43f84211c3e859bf879e1e02489d5456c399c00eed16caa7a12468939a92e9f443d3cf0aa9073405446087e69133e20810bf626b94bac621b7abe586fd288bb126cdc7da684ecdab949aa8153f3165bfa8b50d6a1ebfe8762f111388bacf5ec393f01e1bb723d341833ffa4b3d687ec509d1d596474b19cdf32abad7d063631738b65e4147934f48d693134d625c86ccd6d79fa7524423152af548b6dfa918c603ef067beac29951f4b61090db49d797a192cc1ba9dd0905922d58d38d7335430e456f7c6da3e04676fe76c0abed00d2e8721e9df5d0afdbc6b46b129d01cec668430a41e5bfaf4f8bd96e569cbff6f56d9ade3ea25886bfbc3dffc27fbd907ec626065b5970e933d12c53353e34e30fa88f082a441cd81522f8cc2da2d414f82ce0d7952013a105f5765e0a0381573a8d1b93be94a63778fe9c5116d0ab024ace4748093aac23305261d213ea7bdf064ff8a0db951f8c053735923d8cec6eac8f41e17732f794d5bc7e782d8f726835de8a6028e2d6c3cf72dacf7d31178f8458e6a8bd815930129a905e20fc8599b1ed879b99f748fe24437e6d7ac7c9a560d64561abb28ea59502b90a33b78bc8a439ca2739e5ebeaf6241c812ba1a4ad959568dad4b97e762c53198d017b738b40c28a823534dd389a3fe1a7b6c4ea86c761ab57680543f97bfde154679d75c7a0c31a3dd53c74fa59d0e6d03630a1d059b2418cd6a44db4d2e3205f6dcfd5c40ed1be6dd8c084bee36bf86465b509f15af41336bae2633e5cbabb87de9f9c467599b73b2ba70f2f86afdc06aedf0865c30033ca30f2b0c5bda3892cab35c8fd3dbb9a26d8bb8f23233d700d240af89823fe910a64c4efdf13a45637dadbe04331464f4fcf8efc9f36fa251112c07866ac09ad95092f16dc0830f9c061b1131fa043bb523c78477be8be80165c488736c07eb46203e7c4f492bfec94adab2c894e16e4b0806a9b04d5a61642c503154f5b9557e6de5cb82c6d361f67bf942069b7676bff2120d24c69560df15e64df8bc3f620ccc9c884250f2e522e09134bb75d9f0152a9ac2959237046973310b63ccb8fc9962798d5c5ef10e077ac7f073971eb7e5d36b4ad5346003bf4ece10419d254403bdb7ba0cb34e1e2b91052b5dbdacc13b02c8b923e041126ce25e06d63aeb9a4f820ea565ebb5f1e33a26dd6fed25ddf726c89787081faa34cac69c547c464c1f57f48a5c3f54f91a54c58ee0741b206bb4e819c05010b7084d9aef0d970121ee570e3300195ac582f159417b2f3c79c6c2aaf668edba48110910cb35eeee78bc48ce89b77ce49909401d7278e85b91f90f82373ca2cc75129209a19d9198ff85be277ff71c1531f43d2376c4b2ee6f57fc8b520889f47059d99d624a4c19d0f29807b51e5e7fab52deee4fe90784b92b9c312c7a8698e9cccf6d3b8ac8da201ac053751be5bdd7b794fbfd95b7595b6037b1382ccea0b910c18502d9ccfd9c55316b52adaa6608d3c70606c45db5dd7766fb8b43b0a1688997efbd97d3d85247bb66f840d3ce5658d6c9aa70d26c9f6793594e5b02fa1305463443e2fb013eab617ba3d4b53a25a111b812dd41882d29ab60306882eedb4f65a554948fc54e8c19eb2c0f9c0bd924f2376f56673274d4a8d7f12b7b071b3070e1ef9dab32792cd5eda75233264d12d465a09f11a880d63801b0cbfb53e57b59ff9704b8c16c38454e702866f82ff2c0400dd4b2068dec7eade16356be66531034b9e1854dc7bffafdf9228b89808664fadf5c4e77cef4ba1c8f739a367111276761abe0f2dae95a18807596755224978235c07c271538116a03c2665711f407d640f34f0cd7b9560343fef020a7350a038b9e4043bd8e773e9019430b452eca14feb303cfb29a13ef3ddc36a5d4592accab2361c3ed8cd28dfc8a87e827d999e22d7729def5f1e110b5ad4c00f18ddd46a7daf1b2e71206bc40d844b8e9647f2209a002859bead1657cf3b6911a7c449103124151005144d30f1c40ae68bb73091d9a31f171f6d35e3ddcd17cea45575e41ccc389399fe56d74af71ed5b07e960ca1ce56db7e8cac25de010f46e4a30e8d01b2fd93d21106f0ec0392e006d8dbf5da4d5e3e4e4fab1be0abe2c3157ac61bfe91dff148a5af156e6dcd3aa99972030be4ab73417c343d40c58334fc12ea9e04a0772fbda6b814533321b97f42e392fc7596bacd36f81511fd7a84b5f177e9b03d1be64d444b80bcdf3708a80c26c4dc7b8113645963c5cee88ee6e140d0a0df637cceb5ecb3059c4751062a3b66657640d91deadd05799e2485f9fccc58777d4c0853f3da3194d745df511b312d01074c88e08187d5969fb3e5d9cb06a75f65755dffcf2e65ca92d951f2aa26bf228d6ea9398bbb83d13e2daa6f74f752d79fff6c159155021a940c6f47230899b313cde02249b0b894239d9978e6cc00c4e0ba5129763490b2ad0defc33c3ff858d5fe06e55570c4c6e9acc0252f2a4fd05b4d75ab88dbcebdd2901d95ca2498bff6b1b871bea7802439a0d29f68eff47cf5256cb9d7c19840fcf504dae99b0b5be991b73bb3118dbb9bc2b621e58443c1dd1cde7582b8140e4b7ce4dfb6b93d1602051a96e5fc23dda87577406ff7b91c88c4f7715f06215afe72509ff858b6eb5eee902a635675bb5f049d734fa25ec36c39b22d9e007e42a00396a43a793167ac6d1984e9530f7183da4f53a2bc69e7e50c8761c8f571d72ad06737c56c559290a17186a00e21438efc36968557f07159aaac8207b39b4c79bcb02808121a294a3defcc34a3605dee541c8824f77317622efb5142b575c6186f2c30c0d9ec9bc408130fd68c8b60ed171f9787854f297cea0e0bfaa2a1b58bf4934cdd5fbc28737a659519bdbfac8bea5fc2eb3f08b58b2e455270147eca1b5776821dfffb954b4c01eb4683e677410c3be87ef7280d0de6258a4cba027abe2ea2bcfac0791d0f3c5b2dc42dd3f5ba2d40fa5a7cd43ba7e1f6623c9511914a76b021d9e2fac501333738ed9344621f82a64cb2e2f7bb8bd61d4dd01c6ac8ee81bd1cb533345a3902f380639716903f1b874b96b263e2a5c75367c834d3cb50bbe2f75fc98046626720ecba2cba3fc0b9b64977950c35f60d6f27735413be8bdf0360d1ebbc66b233c7965f0c2d3971feb6acf5618a97765391e2a6663738a2cea638ba52f97b63eb0f7dd9184b1479fd48f736673951112207e33d3c561e393e09c9bd46a8dd9825239ac77e74dfe23664074430375b28e090f7ea1cd853b8fb3283ca84f31c826c508f0229a8a268b5d05c4f1ec3db4f9c75771fd735938531cf7827774ffe0b13cc7afa1080ec277f53d2e74991d46b84e8e40893eba686d8c30b1ef33ccaed6053b40abcba4a311c151810ce5ff0ea6eed0ff986d44157245d90e7be3de04c4311d15f5ed8068aa4a2a3a1f9f512771778763878a6620c24fa3d04d3c865e7bf5e3963ec117c41c8fb52ef18e6080b5ad880f2db86b9b21059afa12e806b238637d37de80f73c22853530330ae28a064606697de4ece3c07a3f02627c8360590d77a36b5d7bb13f22149f4233ade87eb4cd8734af076e4e1350e648cf9caf382a9a8f15f80e41b70d58f20adb8028744a72a4e62caee9c925e6d1a5e5a829918acc59b4b79c7a8d584577a3e9c554b7ebd934477efc11194e591363bb988e463ab4c04ab3723aaa4c857fe77a1cce81a1fc71d9bc60ce0bacc3131a372054fd11902a2c83f7790e59aae4b27a8c8f832b2c4c98987d5a2a89f33180b63aa3cec593392dffd164d930cdb8710cb4bc771cd5e8b61d997342d619d641a16054ed3453ca40c6d60904d1e55bad90e6f47de229bce747d5cf3f1e9d534eadde73c4393c613363da63b585c0c9198e90c4241d408f0e8b1fdf57f450986378be72b94e4c4fdae6e8ee9c35339a289096efe59f7a0ae0a812877f6ea8112756a9d45a7d706052d8ab0309b2aaca371c2f0d762aa1dfc051d0bc41ed1a67add146a354edb07377b9b3cec523f54cea4f6d0d52afa532bd3841c964e0e3ea974b9ff415bfc96ac908c69bf598c1cf86f8ccaabec46e8885ac97061b46e859da65439f10cb4e645917ba94244c2106169ff9ae5e0c8041e7a1bf872c26865333e432b3448c1b4ee722bf08b7304ee51dce7b346b164790ac77382471d0b3452d70ed75e94ebc86f0c4d011688ff48e6f5ef828936b74ecf8fb3f33853593d48f7a3fbd09b922c5888bfaf79080afaa393dac8552a528c4ce87895ca98e944cacf79355053123367c8ef3ca29722e6027c4a02ffa30a1d3ca3107bb2e401580d6beff12d5d925a8cc086c3f07248da99f87e76f71e27cae28ce73cc1894accda24dce6760e3628060b"}, {0x1010, 0x112, 0x0, "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"}], 0x2160}}, {{&(0x7f0000003600)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000003740)=[{&(0x7f0000003680)="237c96e1d5e03c0302f960587776c5cefe8d1f3d1a1b174c97d248aa2876b2c671c09b44d0ce5a6b8fd513a6eae029001ed4ee78f1ac62b90da62e05fd019bd00e7fbfb8c656108e8f99c017490ee164ce340789bda2c15a113798cd6d4fb2db2669d4c98718847179c615354fc312961279fc95fff09a5c5fb3dd4b59a5e18e93039080d85e0666b4a3bbe42651f9488e271ed2bc54874fd7f05e3f8484b8a754e142217c29d9c43d0600", 0xab}], 0x1, &(0x7f0000003780)=[{0x80, 0x1, 0x4, "f1580b939677e8b230efb5309c4fc219ae4025a7273fc5d7776d8c946e74f3491c1ac9090ad19ba15acaa6a49c7def4078e51444c0f535d8bb17f4dfcee047ad93d1c3fd843daa8e4f1f04f85cbee12bc9b56a135948b543fe3fad9bcdfcf5b5b371faebd537293390"}, {0x10, 0x10e, 0x8}], 0x90}}, {{&(0x7f0000003840)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'bond_slave_0\x00'}}, 0x80, &(0x7f0000004a80)=[{&(0x7f00000038c0)="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", 0x1000}, {&(0x7f00000048c0)="5fe74d3a073444cb2427a5aa5d094ee34664ef75b35a20c699e0fc7a1787ef9a27fbb0b3f9a2d564a3b640f4b48a3e93e466b63c803bd06f714fb53050f0499254ad42de9bc00d8144ac787214adb01820cd83494cd7dcb9d3f609e7cf5cd2c5a22684e30066b4cfe0786d2b67ca98834c35c2ce28ebc51f83", 0x79}, {&(0x7f0000004940)="e5b6d8e1d17a2ca81a32b8ebf3e0b9c7b5e5c7b387db6d8c3c9da135", 0x1c}, {&(0x7f0000004980)="29782e17ef0ef3bd88c81f32ad32dd95fcabb51359933249063da42080187cc3929eaf8e50117ca2c405ed157b034b192301ae3a5b8a16e497d604b06ee34727913ea4b5929a88b76c48f975ce90b7701afdb1414de0bdf99000721488dee47c6d48e721f406f006bca1fdabe2dbe8fe729f90aab31853b0428f0c85b9fdc5e38107e27c94df5501089b86c703569db5b29065328cfa4ae6b445d2e8fb7d320f48b2fb10a25fff17a7d569b69e5e0de2cd98296ccbe484a812f5ce38ede6e5da547136594bcc21def0c3777959fe3114fdade15c2d6985e1461c9408fe326d9267", 0xe1}], 0x4}}, {{0x0, 0x0, &(0x7f0000004ac0), 0x0, &(0x7f0000004b00)=[{0x98, 0x103, 0x4, "2b9adcc4ed4f3984b1c289a1f0dab461282c8569fbe390d9519aabe4fd019422ae6cbfa4758e2d6d06590be53706151ef18e15529f863f200d28f4ed0c6e80f9dbd84fdfb5d695ed4b4e92ad4544e2e32c7695794f7bc9fd1f5525996272bcb55afbec44bc5695f6862d6de1d6148dc6aacf6e92e9a0a019d7905204b488466d099528324ad4"}, {0x88, 0x0, 0x20, "457164cffa9c909a4fdc2fedc5f5a6c547364335dc0bbb560bb0cb70ba97bca1e2d470dcbb9e05617fca3ecb891d1e0014d5c6f98f99d3590eee1591b6dccb356ba2cbb232beb0473a995c158b90375dc019a0afbb96924ae33d1239faab2c849d7c84291a38dbe8f1f8abb5736247f2a02916"}, {0xd0, 0x1, 0x80, "ffd0beef8a07ccebf9913207351a62ee6211404d53ec453067b60a6da2ede4d1f1f5740ee529598f9422d63a8352626edfb674da4b156eae2ae52dacad28295336d2bdaaca0b5ef1c8a5374272660df9c7abdffd70e7dbb7679e55eb917b8beaeacd490adf02451fb428345f4a77d2bf42da0462a0dcefdd453957a9cfc84727f5fb59a7a4d40ed9c8a862cdbc6842492bada0fb7ab39272944abebf771456334a7adad0ccec4853b4cbda4182e1d5946ee22fb42dd64b9e777507a922"}], 0x1f0}}, {{&(0x7f0000004d00)=@sco, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d80)="3bd104f0cafd90297b5be01eba1f62744ebdcdf49722f90d9719da54f8f6b1c3321911e793afeeac3c91b62976ce10ce7eadd1ed76dec4bc14430243891539c187004d094fe1ec8c49e66b9b", 0x4c}, {&(0x7f0000004e00)="1ac2ba327f19ec0f6ed424bc5c0d6e31dc08a7e00f099fb7ea92b24e23dd94c77076239d2108a816bac4041171d84f627107", 0x32}], 0x2, &(0x7f0000004e80)=[{0x58, 0x113, 0x1000, "e3a38b2fd9324c1b6e22f43048f85477b509014a39e8930fae99568cee806e2fb3250e331a96518df0b0d0f05602271b0feb6d2e45b53d484002ce4b395d7b6afb25173a0f"}, {0xa0, 0xff, 0x3ff, "92e9705822e9d00b8e46671f8d22823fdae139bb17966e9c3e3d51c19ece76657607c80c5dab8d636f9b493b268cdbdf229b763fe9450d9dc1cc44edb5bbf20f9d99fde15c179fd2df501d8ad4016c1a3dc9dd584e46ab4e1e662706326d152ffd780fb9fffbe3bc2918c93d19af0c1b95ef629b06bdb7c2b489374dd431e261fd538f95a47c47cc953d5c0cc805c3"}, {0x1010, 0x115, 0xac7, "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"}, {0xd0, 0x107, 0x9, "df147f6979d0b64742794a34f07dfcaa0b96b0d980dce5d86d0aa48aee7497c37110244f1121a3f641fb58ccd308ff0718c1c30a91a92d302c4a4e9a695eb8e34284f559c56ce7022f8de49e43623d63c17fd53fa93475b07fd270fb799c9401b60d4d90f10b4bc2134983363f08019ecd51687508694d6d8c16f55820043399c06a8e82e49f4a0e4577d3cc9933a7f686085adfa73e72bf7561ad79db7c656bee3e58c34480b1ed545a0b6515c0287ed64e405f02d8a56b66d949ec65319c"}, {0x38, 0x113, 0x5, "1060b52deb132a56b2a22a5341359c1895e18737a0ceceb0dc620aa49622562853fb7af42182"}, {0x28, 0x1, 0x20, "073a9bf2f366046b0c07772ecff56c565e"}, {0x100, 0x6, 0x4, "30ae5db936c6d3f5d797a323be49aa02ff6ec720c22c71f0ddb6d959ccfb6323298018533fe817ca2333c10f53b43064ae5aefdc4ab61245bc556d2d956670396ece83e5232f343c1754aa7fd6f1d3a9cc16a62932ec86ddd314d150f4220d63ad35333d96e845fe8cc691eb05c5eff07a0c61416fff9d0981a38daedb96224b82e273255bca0b864943198226a01c6a934042a17096a1d56d22d9a99c633da51fc6fbfc114d500dff98250d1334dede25ca79fb46291d57d57e30a2af2fd7389427308f16a03d336b85fcfa03b9233e05dc14b7c4ac23916c1c9aa05d4980653b1869ff751944bdeff13898b9507ac9"}, {0x48, 0x109, 0x5, "f7976ac822fc04fcc8c6853ee79e9a33bc5b786dd379d4dfad2546a31e102ff95e59dfd09ddb2576e7750d146fb8a2929b219ce541"}], 0x1380}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000006200)="2dcd9ad2a4c2290cf9abf043c2da58561b6d598736a0a21d13631a45047f5d66ff140ca921f9356d4a89961bdd3af63b53907c1ece6c9d24fc22147c6ff93dce3f16752ad7142c", 0x47}, {&(0x7f0000006280)="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", 0x1000}, {&(0x7f0000007280)="1d995d55fdceb9d37f0d119e2c09f90f0f5c5739447973a03d6224a9eaa0816179d393c9d12efaeedfba385c7b0fedd9df969975509c1cbe8b0e17de2ae30205cc7370248e8260e1b04eca9e777d464ba17881a395dd051881c36fe2b0625faec857cf30e07e343be369642c1b2a0826815893fe5919", 0x76}], 0x3, &(0x7f0000007340)=[{0x108, 0xff, 0x6, "ca02c40b5558469e3a2131b5797a9ab2fdf5ae10e3fcd0593a20f9f514079cffd96d93ef46990d4874d81aeb77d971312f162c1957a2ee20ee9e40f5495db167b13c9be017590c1370720c5bbc77b15c14be222bfc1413de3950a68724178b2a02babe5bc7971638780e51274f0aca90f4e47683e02e64be5e6b2de052f5c5edeeb2763bab01ec43fcc3b7de0f823b44ee74b65e0e5f1c3fac7f5ce82010936e5081c91a958400b44cbaea38503d70cc16330f6982e900ee92dab8d2bc6713d409e79264eccbd8b88b6ff8074b51772c532555a618dcd594f47dc859460a2ad46b045f627e6fdcae19aa71db9dab414e190b484b243d21"}, {0xa8, 0x113, 0xff, "7288161dd2f2b0a5a55584847607bc2b16f02c1024306f34a82e5031fd3f1d2156d396b00d4aa040749a5f72a3ee96a2773fe09f2973151738c9d6e29e3964838693a0376fd11b6c2fe8d915a1318e6bfbe511fb1845dda13b1cb47a782e22cad239f9149df3c9626d633a310cef1367d1f331314d504e437113790593c3f26a2d26dc2c68794283af957ca7cfb8fae58904"}, {0x58, 0x118, 0x4, "77a51c617d2f23539a577d061fdd62eebbaf4d8f78f09ac1aeb13cd249f00b32c5fee39d7f67fce0eae62a6574ce070766955e9a32cbbe1ac436ca196e25e4aecc2a22de292526"}, {0xf8, 0x1, 0x800, "77ffa0e0938699ba2cd254703e0b1f4806362bde767d563e511ae89fd775028dea51fe962efcfdd5b2aa71c9f4a805891d0cc63ff7af9baeb57f49a6d2d5921d233ad7960692bdacffef3cf12ea3836dcbde5ba944cc449e1d3db9226ae0f852c19daede6026b8d82dbea8abd0e0a4f59ac1542baf353976931bb5b766776ddd33aece09534ebeecbf777500390b7a8303ad6a017aa5266a3abb4b84aa35a9ef0bc2d015fc1b06ba38cc0d46e4590b53dafce2103400282002091c7cfd5b35c7485d9242018deafd042b36698df0766ea9571007d23abc02642154ba9c27aa75677eaecc"}, {0xa8, 0x0, 0x4, "f5f5180c994634b7021687eda829f060299d41e180ec8941659bf41de698e8fc11b2e5e1fe0d84a194df4084f27c10c53c553e2fb188202bcd08580e110e81fb73e05d94f2d61cd64eb96bf5ddfefce9f648ce5a2f35e99cd3eb2d6408fc89747a3ddaf280a1a9b345203d2e879d9a7e4048aecbb8ef1b7c83743184a6257cb9d45bad8ac44ab4ccb053d65d7d83422c22d89c"}, {0x80, 0x29, 0x1ff, "e6b4a6958f3306447f169deffe6159d6e7a428a21dfb438d0a2aeeba3da203922d23e3992d769e630785cd3673e920a622e815e7774fc00edd2879ddc95c1fbd97f52b7e00998157a6e0f5564c6b686568767c04dd3f9d89415522880073779a594e601914a28d5ada353481"}], 0x428}}, {{&(0x7f0000007780)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede-generic)\x00'}, 0x80, &(0x7f0000008c40)=[{&(0x7f0000007800)="c46d16bed49273c938d8cebaa25eb010dcdbbd18fa3cc4fad7b8c1ff7459efa7454f451c13cde288438a3a39dbaf19850115b332be82df168961093ff8c7bd95379b8584856302e3abb5206aad84555cd71094eaa43c719fead7932251f120823d3adeda6a01dc", 0x67}, {&(0x7f0000007880)="5f90b402e3ce92fad9b3829f8fc4542ed6e897dbc2e0e3c8ad288908ef4c36d52762b9dcd2cae414eb8f5aed68673ebc46c4b8c90b9c4b12d44aefee9e4b058a27956dfb56ecd2d76f8cd77a5c25fc0e1b355bcb247dc32e3da5633192cc77028d0b8238a3ebbd1362ef71e511d6240e6309b1ae688babf59fe215c3e0699f74f100078aaa9e04e67b", 0x89}, {&(0x7f0000007940)="befc458ef75025d672a356f53beeb9a5d0e6196a6e01cbfa77ae9bc49537c1ddaff0c6940d950300f0f3126ac6bb1c25732e87c72e2fa8cc69f67a7f0c488034219d256a34afa0595de5403f6bc73c76eb730b7e7a15d93efb74974d22722cae54630c49f701ea9a0d96c27204b1d13c246db19cbc74215f76c2171c7a62cde612a14a2fc78f423d230f9c9a53e7c491208b38348b6bda6ef8992f9c33a3068704d8437ea48291efc66e9dd0414f975776dce27b9639445a73bfe2", 0xbb}, {&(0x7f0000007a00)="d28c88", 0x3}, {&(0x7f0000007a40)="39f34d5d17d36f4708f433fdf715fa57bca6faa57ff02e16049b23e673beee4f9f5d170d26073b9eb8cf0e3251f88acaa4f23db7f2e8a248e49e436f9ac70dc7160efb4a18b5c9f2a1b830c64e", 0x4d}, {&(0x7f0000007ac0)}, {&(0x7f0000007b00)="c4397a28242caed8da4bf3ce2e52e6508b0855d714a25e93e09a46e5f2130e2f855897d307c01226858bdba404cb0b6f4556ab4b9c080cbbf8cf7aeb868449522eb4381a74c1438adcabfdd5b96f78ab77a6c0e1ae0cf605a0778d3bda0399609baaea727f8bffed9537fb26729c31ce1007bc125d398d30af6f562c8469a33e5bc224254fcd1169a4a7a9ed4174833398032f34b421b806086bb08e63e95106e64b9d7f31bae58c08f661b4759ee82b65ddb0f9c046ba04ae9a62a5ebdeedf6312ba9ce49fa", 0xc6}, {&(0x7f0000007c00)="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", 0x1000}, {&(0x7f0000008c00)="43d2a974076239606c6951bed0893c03dbf90bb61313c4985410327ef5d76770ab7394285021ebcd359d35d85aaa0fe32e", 0x31}], 0x9, &(0x7f0000008d00)}}, {{&(0x7f0000008d40)=@in6={0xa, 0x4e24, 0xffffffff, @private1, 0xebca}, 0x80, &(0x7f0000009140)=[{&(0x7f0000008dc0)="c2f89052ba8214b957dac2e379909d1ae4dadb41ece984a491777b0faf5fb94915c7a3caa0222e88fb417baa50ca0628c9b9d34c093fda506243a0f733b76eaa66f1c3c649", 0x45}, {&(0x7f0000008e40)="fc07b1f75be0f279af358b010cd71a9d40c5448c65e245af76592d25c60aec18c3ddcc1c8b2acdcf7dd4e0be08a296fa963f35484d509cb29765c29c45c99e8be3d91aee087240b5ba8ca425a5f58484443dd81d07e2ea1768285fdc32de6a52cc88a6546ed3bb8a605e5fe85fef1ca8ac06411946a5cf5186461806191dcc3ed11e42362da95f4d368a66506768aa024cd8e0c85a601489f105ef1e8dd9dd7f39deda51b6825d89e7349e0ff0bea9a9c79acd8e2f4f86", 0xb7}, {&(0x7f0000008f00)="88870b07ca1d4e58fa2fa15f800cb87a3852ce6ca9673819318fff5451a305ac951c75d1f604681dd4b3785b3e4cd5034b39ffcee86ce17e15763ebec0255c552efa2898c9b03feebb5720cadc9d3a7170f5199db230d97f1707771e23c8ae72dbe583e315864dc5151c8a132416ac39eb485c3bd7b5e94aa539120c92e2adde4f271d88e22d11bcfee1aa7d9985ca5e07d8e91509ee082fcfddce88934cbc", 0x9f}, {&(0x7f0000008fc0)="d63f0870eb84266946212ada6f59d1d4c79493d2b3f8053cff4570358f1e44a89b97769d8d59179ebcf2cabdac0cd20f024ae01361d9d5259114209ed4eb9851eb6b5ef6b30606acb5dd13c971a137273f20945e1e8da9c328fa92165a5a66e1e29a33b10b01fb39f8800e579aeca2648116bdde3112f14e40d4dd75e31febe3c66394fa8824e7662c342dab4d148fc4f8ab43946cb5682ebb6b463f1eb0ff32005cd259f869710741cc142a95caacfb3eab08744d036172953f0f9f96cac42b782e57090a9c639197153808a28ab4c7ce0887a7fdc9d5c57c435d39de50038c6a8bc4d2f764f4f60318355b9c802a5866f7d94570b2b33198", 0xf9}, {&(0x7f00000090c0)}, {&(0x7f0000009100)="51dcc0cd06f5b9262bbdc10243824754fcd1f0dd483630108b4b8cd0a1339d7f97deb4ac", 0x24}], 0x6, &(0x7f00000091c0)=[{0xa8, 0x100, 0xab9, "0cddc3a164ef59a562236fa818d9a1d6c3ed7cc8de98d1c9db2a78103d4670f0a3348b240d8e9ff57cf2d17d6a06a97361e7c4e11896e384f275ba42c5d0ff42dfb84d1b42dec7d2959eb2f3bc824d558ffd74491ef8a02114004a70524b7065e1d269ec42c641be1fb03c331d9dd62a7c7346071fb019f52d74bcc0eff1aa059af3c5f8a156c7ddc4c91e51b70208c957"}], 0xa8}}], 0x8, 0x40080) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="68755d653dc620766502044f858c05d3c94318371afad9eda5b4601e7898856891d8772443957786c24dcda38650713219c22bb514588924c5cb3c3fa558ae6b3f25b16680cd765f8588d10658877816846f1859b6695433e0a574885d221b8e7d70b1434cc4e1ea1f1c1c19585d0396879373da1c2269c644bf0eb0ade8a2c00773cf8993397283b9d0d6e66f24ab0b49af175d6818ac7b9b5304"]) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x5a0, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:54 executing program 0 (fault-call:2 fault-nth:48): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 316.926760][T13109] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 316.934712][T13109] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) 03:00:54 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1100}, 0x0) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x5c8, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x8}}, 0x14}}, 0x0) 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 317.008351][T13137] tmpfs: Unknown parameter 'hu]e' [ 317.019250][T13142] FAULT_INJECTION: forcing a failure. [ 317.019250][T13142] name failslab, interval 1, probability 0, space 0, times 0 [ 317.032426][T13142] CPU: 1 PID: 13142 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 317.042575][T13142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.052622][T13142] Call Trace: 03:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0x10) dup(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 317.055913][T13142] dump_stack+0x1dd/0x24e [ 317.060248][T13142] ? devkmsg_release+0x11c/0x11c [ 317.065188][T13142] ? show_regs_print_info+0x12/0x12 [ 317.070397][T13142] ? pcpu_alloc_area+0x7a2/0x8f0 [ 317.075336][T13142] should_fail+0x6fb/0x860 [ 317.076329][T13149] tmpfs: Unknown parameter 'hu]e' [ 317.079752][T13142] ? setup_fault_attr+0x3d0/0x3d0 [ 317.079760][T13142] ? find_next_bit+0xd8/0x120 [ 317.079776][T13142] ? cpumask_next+0xc/0x20 [ 317.098877][T13142] ? pcpu_alloc+0xd17/0x11f0 [ 317.103467][T13142] ? prealloc_shrinker+0x50/0x210 [ 317.108489][T13142] should_failslab+0x5/0x20 [ 317.112991][T13142] kmem_cache_alloc_trace+0x39/0x290 [ 317.118273][T13142] prealloc_shrinker+0x50/0x210 [ 317.123097][T13142] alloc_super+0x5f2/0x760 [ 317.127496][T13142] ? mount_bdev+0x340/0x340 [ 317.131975][T13142] sget+0x20e/0x4e0 [ 317.135775][T13142] ? test_bdev_super+0x40/0x40 [ 317.140512][T13142] mount_bdev+0xe3/0x340 [ 317.144742][T13142] ? kill_f2fs_super+0x330/0x330 [ 317.149652][T13142] legacy_get_tree+0xde/0x170 [ 317.154312][T13142] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 317.160360][T13142] vfs_get_tree+0x85/0x260 [ 317.164754][T13142] do_mount+0x18ab/0x2660 [ 317.169057][T13142] ? copy_mount_string+0x30/0x30 [ 317.173965][T13142] ? copy_mount_options+0x59/0x320 [ 317.179062][T13142] ? copy_mount_options+0x293/0x320 [ 317.184231][T13142] ksys_mount+0xc2/0xf0 [ 317.188359][T13142] __x64_sys_mount+0xb1/0xc0 [ 317.192917][T13142] do_syscall_64+0xcb/0x150 [ 317.197391][T13142] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.203254][T13142] RIP: 0033:0x460c6a [ 317.207117][T13142] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.226800][T13142] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 317.235183][T13142] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 317.243134][T13142] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 317.251077][T13142] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 03:00:54 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1400}, 0x0) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x600, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0xa}}, 0x14}}, 0x0) 03:00:54 executing program 0 (fault-call:2 fault-nth:49): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 317.259020][T13142] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 317.266985][T13142] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(r0) sendmmsg$inet(r0, &(0x7f0000002580)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000040)="53f130a718332b09d4fc74b66271e7843dee8ef1a7850dc09e49e189b0b65d2cd7e0e7772a0e4b4c9b9f6fa27dda1ee5dbd2b66996a155b9279ef8b0c2cc5997fad52c5fa2c8dca44ce288df70c02a47912de290def3bc5a97662c1e862e1b72e77d4fe0db285af56a2fb97964d6c3a545ff997b2759ed00e15d07", 0x7b}, {&(0x7f0000000140)="ba62de5c469cd038cfebd834a9847fa170", 0x11}, {&(0x7f0000000180)="6261b669d39adb", 0x7}, {&(0x7f00000001c0)="f6ff989b5bbeaa6719e7d915a120da0b30c0e864723d3235490a1c092f19432f5088da9ea289245c119ceefff022651f77b16c82d3cec0e7fb6abe9673d7", 0x3e}], 0x4, &(0x7f0000000240)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0x18}}, {{&(0x7f0000000280)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f00000002c0)="dc5978a62d0138b966faade33c5c8a5f2dacef0fc3131cffc9eed35b5dc6b9fef9a4f41c949e9f130b144c2c3612fd6c4698fc43e99e58b381e92c3b6a24fae0688e75f4e410c9defca981cdddaa5066968960fa954cbd40d3544c43f7b2fdf2ae71d0557b0e3d640a8956fee47c2452fbe8859719e71758696fa0cd821843d85a97160c38e640f6005aad01555a84f9acf02ba76f7e67ae72f52384ee07ad10ee527a94da34db32da0ba8ee49899b97dd254e3331b132adfcf5696f10d5e2cbae4e9ba50be6a3411556fd013e526b1cb0931c0e", 0xd4}, {&(0x7f00000003c0)="139d35a40aca9f6ea1cc04145eb731ddb8f5fabd29a4280421234fe56fb4dc8f13f9c38c795657fd545b0def87a04d69995532444385629a75ff59ccbfae4cb252af946e6aa32c4e3564c8a0b507646ae4dc8eb8f1ad15c8c2c851723c4f9770b55ed22d1a4ac8aa1f01d6bc386e4b84416cbe9d65e194bdbeec585247713231846d2fe6ab57e005a35e3cda6dd5c801817d640518be4aa32d9ac7a5fc5f500a", 0xa0}], 0x2, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @rand_addr=0x64010102}}}], 0x20}}, {{&(0x7f0000000500)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)}, {&(0x7f00000015c0)="65c5898fe2453c8feb52461004b2eaf0975cab5a49f55740217deffbe737e422d7", 0x21}, {&(0x7f0000001600)="f86e676e656a3b9b0c29610bf71d295270dd5ef10725", 0x16}], 0x4, &(0x7f0000001680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @private=0xa010101}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x34, 0xf2, 0x3, 0x2, [{@empty, 0x3}, {@multicast1}, {@broadcast, 0x4}, {@loopback}, {@broadcast, 0xb3}, {@private=0xa010102, 0x1f}]}]}}}], 0x80}}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001700)="3849c75fe8137a88b39948b23e1e54c367efb37d880161cb30c7f8b2b94f73044974aaa498bbf5ff7ef2d2810a116f7d2a0f6b8cdd0c587a0c5a959d44c2150afe9dad2ef88376269fa040df009de695ddedef82e409df45a8912d7f7a8d235016bb8c6bad056d8ed0e70624a27e11893cc754c63ca9b6c728ee404365029e6ba2531e54b6871e854805e4e470ad109abcea9ea0f36d3cfb89b318b75be8bd2247a52c657f95726cf343c5ebfe31e7e23bdcda7be558f32f68d5d23a701e1c9d332c9b6253ade94748f523556577d96628d80134b0c8fc140d6c2c992d550cd163793fa00d37766ac26f8b4849691551469f87013ac441", 0xf7}, {&(0x7f0000001800)="eae5936878b21a92a7945f59ae5f1b593ae3e097185bf4b965bf92e381f183b4295df7367ec7a84d48d9a39fe9b1f093f546e6b845dad1b7b4221cc9866502277a3d98535eaf7688bf4e20ada58ec85a8032500575d2aedbbe18b1f998bce0ab1fecc36ea9fa283e899e7916d2f50c2b4a691b2523904dadec28420fc8edead5e73014b3c749e5d2700726857d6b63cf6278a83311c0603fdcbc716d7672d7484126794cb1bd27ff24b08de480cca9077cbf8d06d269d4be7539b2080e795a49066a304f12f71e52dd648667cb14942e5f621cb65aac89", 0xd7}, {&(0x7f0000001900)="670697dadea5a07d9f5ace1987a6c7fd1ce8ac1eecc08843919bbc7b37cdb5dbac37988162df99deb827c807586c72c51e596d0b3120bdb42423f4e2deb9390380980d2f8cb4e1343557af652c6bcbd4a48d51c185b1e309f1e3d61a4c9329a4a1a184e33e9adb83f854716b105abf7771f32477ccd46845a6be5691f67cf1eaf5a0f9e84e6d39797678fcad1c763ba72c2b824b55295e5d0a173211eadcbc129fdae102bd04dd03b88f2a", 0xab}, {&(0x7f00000019c0)="5185e4370e47dfbd57f1418330f259505f4d147e0089c5f96da73bbd3d105d0d6ed43fe7931613172741c460e28eab168109ba6d29285ed687f74db056e825602a233f2096de61616da8e941d94ebe7318190e3c2ef402d471c465ba21fdffa8da2932858be0e0c38a112baff58b032647bb6b59e436d10577e42b4fbe0420643234711ea48cc427cb970f9f0a03e332e7581e1188d6e1045a2ed241c0280f791b8db16ae05625b00a46ab0ebed83e2e9f7c9ca0a25f2eb14a105efdb539948c3336db170b4752cae225ed0ea5b80a975bf93cb3a5074fb6b9fbad1e7170239e105143a300154288501a118fd4f0678235cd8aae1c05ff7f", 0xf8}, {&(0x7f0000001ac0)="88dfda5f32b65fb1898bd196b24ac3bcfe69fb24b81a6e4e6a9d116f59faef449f32a77a189f80fbb90cc8e4452cbdacb190ecec1c261fced8a374c23203ebb06d5a0bcd35b5fb1f8c623553a83fa21c7041a49512896c33070d81b44891815bb18bbf202f7a3f9f8ba792c3654d19f8777b823ddc644b97a9f8632821e9035edc6d1d8a28d6d49feb268d3e4ec504eafdb993c2", 0x94}, {&(0x7f0000001b80)="3c7f98ffd5cb92fce722972856c0976dc0ea251c04406776e42ded4aad832482944944bffcc62ea9a17a28457e052cbc6549bf8f1fb6f4dcac1b78ec074a67e06e73996e27eba89a4cb615fe247d5d7a53a9bed7270c6ade1ea2014f2a5da290e951d28cc924bd8671c0f5015b3356da5bdc6fa1b6e28877396aa32b6d88d65701366cca6c713643182e697a56e4308c6272e269e6d79fa1ae9b3129236c039520f5a25b361dbfa336a95fac6227c3524a5023f99d20900e03e27f44e78a4755d5008f203a31acf83146dd459ce7976ea4424fec3e0b39d3058ca3e410807d8ebd9f156c8c", 0xe5}, {&(0x7f0000001c80)="d73587d98fabb0a3322bc00b7a5063ad63406b18330c319142c9148464c54512b541e5dff4ecb9dd06d35ef96042737c3dc070559b6fdaa5aaefde28f17505cc31062aedf287ac57081f29248286d8595897052c6cc6c09715497f9194979b1f2b6b2099503a7fd8fe12005e95f283b83a57baf9300bd57c8bdb80a0dc813b3d20dfca11c845eb53", 0x88}, {&(0x7f0000001d40)="f83cd46a69952f99332ffbb0f37bfd3b9d5200f3e775eea438b7a1bfb16f0d7ebe944f962351bde67312b2de6c3f077a3120a0d34cc01f0c55c734bd4738210ae4e48737d0320a9ac62e97f54e006756237824762496e2bdde779deaf9de61d225d285f569f69b4202feb755e6d84153be4639fb7e7337331efdaf007848ca68f9b2b8eeba39672274f5b5ca7e7cd69f823d7e3c141bbd4c394de807511ea5ff682da3686283f6e5", 0xa8}, {&(0x7f0000001e00)="59ece513541342f2c4cf2dc97f918516ae79305281a18d3f8ffd43ac8867c956d34301008352466b8a3635c6b49054439a60833bd6bddf5a9b851de5fee230ee20bc589711d62928ee6adad17f10bac8799566b1f884e143f81f6a0d2a7794edc87f9d3f89a4be6b7d0ce4bd7517395cb8153c3a8d5b5447dd9f02eedb", 0x7d}], 0x9, &(0x7f0000001f40)=[@ip_retopts={{0x94, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x7c, 0x1, 0x4, [{@empty, 0x4}, {@dev={0xac, 0x14, 0x14, 0x34}}, {@multicast1, 0x1ab}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x401}]}, @timestamp_prespec={0x44, 0x1c, 0xb3, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfc}, {@local, 0x7fff}, {@empty}]}, @lsrr={0x83, 0x7, 0x40, [@dev={0xac, 0x14, 0x14, 0x3c}]}, @rr={0x7, 0x17, 0xb7, [@loopback, @remote, @rand_addr=0x64010101, @loopback, @multicast2]}, @ssrr={0x89, 0x7, 0xcb, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x8, 0x29, 0x0, 0x6, [0x8]}, @timestamp_addr={0x44, 0x14, 0xa0, 0x1, 0xd, [{@broadcast, 0x1}, {@loopback}]}]}}}], 0x98}}, {{&(0x7f0000002000)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000002240)=[{&(0x7f0000002040)="8fb69172199da52c2b4a271b80946d248444d9eafae70f292695fb1dff4144d09fc7630b2b96", 0x26}, {&(0x7f0000002080)="eae9e1ddfaf4cd5ebccb22f2ef67080a23882be501f78040266711982df5243a945fec15c5ebb80c969ebb2379c89fd1b9d3377c9ebdbf714103eaa8730ba3d92a5b3bf1aa78ec4f660d5c0df9e7119f3272c5cc250064f9ae0ac08e2d2d1acb7ed2274bc49c83bfd3eccbda69329bc926fa288b48487d4278cf09264e428e2efd5f421c9107097d25c3476219f22321b4797ad0ad8e1c3f25d498bf8e439235eb633a39", 0xa4}, {&(0x7f0000002140)="3f82f247cd19fa39028fefab3f127bee37813f72c6c05501ce553f7bceddf876db0f444a7cdfbe35abc3d92dd0a4d7f28228ffeddeeb87ef46ac7fb56f28d6b03ae3c9d365dd6cd2f6abdcac322f0e9e7606e6672989e452d5aefcc473d28445d12219aa77b5cdf99c587a3e25785a7709357aab7c8e7584ee0805b81906bd4f1752fc913a8798cff6baa519b48f5b5269041b80fe1b9832adfc316824441d5afffae6c2552680ef614f419597a9c0b527dcc162a3ea99eaff7adef4e34d53266d7453b4", 0xc4}], 0x3, &(0x7f0000002280)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f00000022c0)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000002400)=[{&(0x7f0000002300)="f04dd8ab35f7d3b639f359c78de331798632ca47feca805d2edfdfc8c598be676b646ba1889cdbf14b84496a7d70c980eabd892da8c314de63e67bac8434e9d95c2055e423e5b899e2dadb34d6f2c716aa4ce718091eb5cfadf79cc20e822aa0476298c77a853050822fe13f5b2505e53a76e8502ba8c8a4a43beeafd89c27e43614b902f0ef181e5b", 0x89}, {&(0x7f00000023c0)="6ed8f306dd20bc5491a3459a7b4017c4f955840ec970fdd0e8df3c88b2fad4a2e52c4c06a8c5152edfb4c31a1dd626ae22b3df9743ee15670e44bfc7a819", 0x3e}], 0x2, &(0x7f0000002440)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x88e}}, @ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_ttl={{0x14}}, @ip_retopts={{0x54, 0x0, 0x7, {[@end, @timestamp_addr={0x44, 0x14, 0x47, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}]}, @ra={0x94, 0x4, 0x1}, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x26, 0x3, [{0x2, 0xb, "60448c3bd88b72c3f4"}, {0x6, 0x6, "26b113b6"}, {0x1, 0x5, "af010a"}, {0x2, 0xa, "502bc14f74df2227"}]}]}}}], 0x108}}], 0x6, 0x20000000) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=ANY=[@ANYBLOB="0023a8db7a57f2bd6e5dd695ed37e5b3024a279d9c12c64e0973a811bc9cecd7ad0db64fe857d826e907686afd78956630d07c2af39bb2aa6ef6ca0855bcc02ae57daa189f4b611a6dc46c8d032eaee7de3b0d7dc72613997c54895698ea028154ec9e7b42c78fe1ac1340bfcab42ae5e64866c0737ac1930541fa282de3d5990765a059b43c50a62a0c9a921e68ab0f5c094f301ccca73a203fa70b8fc4f5a20f59e9852a5d190fe391c4d7f958ee9806c026286ba9d524eee2870a4704b982ce12970bf24e82a2c498851ec3b4d58b68ae81127d9bf9684da952ec84516d58"]) 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x700, @loopback={0x0, 0xac141409}}, 0x1c) [ 317.330814][T13166] FAULT_INJECTION: forcing a failure. [ 317.330814][T13166] name failslab, interval 1, probability 0, space 0, times 0 [ 317.343638][T13166] CPU: 1 PID: 13166 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 317.353918][T13166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.363965][T13166] Call Trace: [ 317.367255][T13166] dump_stack+0x1dd/0x24e [ 317.371586][T13166] ? devkmsg_release+0x11c/0x11c 03:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x10040) r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x389, 0xe0800) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) r5 = gettid() r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@dellink={0x58, 0x11, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x800, 0x2000}, [@IFLA_EVENT={0x8, 0x2c, 0x3}, @IFLA_NET_NS_FD={0x8, 0x1c, r4}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_NET_NS_PID={0x8, 0x13, r6}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x3}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}, @IFLA_LINKMODE={0x5, 0x11, 0x40}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c854}, 0x2400c000) recvfrom$inet(r2, &(0x7f0000000100)=""/238, 0xee, 0x12040, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000000)='./file0\x00', 0x100000003, 0x0, 0x0, 0x40000, &(0x7f00000003c0)=ANY=[@ANYBLOB="687567653d6e657665722c00a8d106c8e6543031cbffbd161b6ca6855dec7462c7d9fcf07c4c0ce550b8a11f1abad6e312a5d7cec2d0c487d8d55b0f4adc647b472b8559ad31069f50b0eb3917b88914cf6f89749f2b59db8e94c53723a91d900dd7a15a294bcc1907b23e5be042c68099571d60972ed37b8f14cc78c079eafcd48e643af2f15bbdd24b148cdb12ad5a41a4de659868a99cd658dc72fa995cf99e2d02a306263e2081390ca143ffd8e4b24c8a30942fce7e3fd7a9de4fc9a77b72aa7a0dd2de04f7730da21d8e581774cf684febc426e120fdab96da9f587e271236af1e716907df"]) [ 317.376529][T13166] ? show_regs_print_info+0x12/0x12 [ 317.381726][T13166] ? idr_get_free+0x6de/0x880 [ 317.386399][T13166] should_fail+0x6fb/0x860 [ 317.390816][T13166] ? setup_fault_attr+0x3d0/0x3d0 [ 317.395845][T13166] ? __down_read+0xf1/0x210 [ 317.400342][T13166] ? up_write+0x187/0x280 [ 317.404669][T13166] ? __list_lru_init+0xa7/0x570 [ 317.409512][T13166] should_failslab+0x5/0x20 [ 317.414008][T13166] kmem_cache_alloc_trace+0x39/0x290 [ 317.419283][T13166] __list_lru_init+0xa7/0x570 [ 317.423940][T13166] ? prealloc_shrinker+0x1cc/0x210 [ 317.429026][T13166] alloc_super+0x61e/0x760 [ 317.433421][T13166] ? mount_bdev+0x340/0x340 [ 317.437893][T13166] sget+0x20e/0x4e0 [ 317.441671][T13166] ? test_bdev_super+0x40/0x40 [ 317.446403][T13166] mount_bdev+0xe3/0x340 [ 317.450632][T13166] ? kill_f2fs_super+0x330/0x330 [ 317.455541][T13166] legacy_get_tree+0xde/0x170 [ 317.460191][T13166] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 317.466227][T13166] vfs_get_tree+0x85/0x260 [ 317.470616][T13166] do_mount+0x18ab/0x2660 [ 317.474919][T13166] ? copy_mount_string+0x30/0x30 [ 317.479831][T13166] ? copy_mount_options+0x59/0x320 [ 317.484919][T13166] ? copy_mount_options+0x293/0x320 [ 317.490103][T13166] ksys_mount+0xc2/0xf0 [ 317.494289][T13166] __x64_sys_mount+0xb1/0xc0 [ 317.498858][T13166] do_syscall_64+0xcb/0x150 [ 317.503337][T13166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.509203][T13166] RIP: 0033:0x460c6a 03:00:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0xf}}, 0x14}}, 0x0) 03:00:54 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3000}, 0x0) 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 317.513113][T13166] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.532696][T13166] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 317.541126][T13166] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 317.549083][T13166] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 317.557055][T13166] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 317.565046][T13166] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 317.572991][T13166] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x11}}, 0x14}}, 0x0) 03:00:54 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x900, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x800000000000000}, 0x0) 03:00:54 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) 03:00:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="687567653d77690468496e3bb69aa05f7369"]) [ 317.680019][T13212] tmpfs: Bad value for 'huge' 03:00:55 executing program 0 (fault-call:2 fault-nth:50): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x14}}, 0x14}}, 0x0) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa00, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:55 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) 03:00:55 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x6000}, 0x0) 03:00:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x3, &(0x7f0000000080)=[{0xa, 0x0, 0x0, 0x800}, {0x40, 0x6, 0x0, 0xd750}, {0x8, 0xde, 0x20, 0x5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r2, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r2, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:00:55 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe000}, 0x0) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xf00, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:55 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1100000000000000}, 0x0) 03:00:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x30}}, 0x14}}, 0x0) [ 317.746905][T13227] FAULT_INJECTION: forcing a failure. [ 317.746905][T13227] name failslab, interval 1, probability 0, space 0, times 0 [ 317.782520][T13227] CPU: 1 PID: 13227 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 317.792704][T13227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.802751][T13227] Call Trace: [ 317.806030][T13227] dump_stack+0x1dd/0x24e [ 317.810337][T13227] ? devkmsg_release+0x11c/0x11c [ 317.815251][T13227] ? show_regs_print_info+0x12/0x12 [ 317.820428][T13227] should_fail+0x6fb/0x860 [ 317.824845][T13227] ? setup_fault_attr+0x3d0/0x3d0 [ 317.829844][T13227] ? kvmalloc_node+0xc2/0x120 [ 317.834492][T13227] should_failslab+0x5/0x20 [ 317.838994][T13227] __kmalloc+0x5f/0x2d0 [ 317.843124][T13227] ? __list_lru_init+0xa7/0x570 [ 317.847948][T13227] kvmalloc_node+0xc2/0x120 [ 317.852433][T13227] __list_lru_init+0x1d2/0x570 [ 317.857180][T13227] ? prealloc_shrinker+0x1cc/0x210 [ 317.862262][T13227] alloc_super+0x61e/0x760 [ 317.866651][T13227] ? mount_bdev+0x340/0x340 [ 317.871126][T13227] sget+0x20e/0x4e0 [ 317.874906][T13227] ? test_bdev_super+0x40/0x40 [ 317.879640][T13227] mount_bdev+0xe3/0x340 [ 317.883856][T13227] ? kill_f2fs_super+0x330/0x330 [ 317.888768][T13227] legacy_get_tree+0xde/0x170 [ 317.893418][T13227] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 317.899472][T13227] vfs_get_tree+0x85/0x260 [ 317.903862][T13227] do_mount+0x18ab/0x2660 [ 317.908180][T13227] ? copy_mount_string+0x30/0x30 [ 317.913095][T13227] ? copy_mount_options+0x59/0x320 [ 317.918227][T13227] ? copy_mount_options+0x293/0x320 [ 317.923404][T13227] ksys_mount+0xc2/0xf0 [ 317.927590][T13227] __x64_sys_mount+0xb1/0xc0 [ 317.932156][T13227] do_syscall_64+0xcb/0x150 [ 317.936742][T13227] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.942661][T13227] RIP: 0033:0x460c6a [ 317.946538][T13227] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.966160][T13227] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 317.974544][T13227] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 317.982488][T13227] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x1100, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2002, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:55 executing program 0 (fault-call:2 fault-nth:51): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:55 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1400000000000000}, 0x0) 03:00:55 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe803}, 0x0) 03:00:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x60}}, 0x14}}, 0x0) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x3f00, @loopback={0x0, 0xac141409}}, 0x1c) [ 317.990432][T13227] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 317.998374][T13227] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 318.006431][T13227] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 318.084137][T13261] FAULT_INJECTION: forcing a failure. [ 318.084137][T13261] name failslab, interval 1, probability 0, space 0, times 0 [ 318.100692][T13261] CPU: 0 PID: 13261 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 318.110862][T13261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.120910][T13261] Call Trace: [ 318.124200][T13261] dump_stack+0x1dd/0x24e [ 318.128526][T13261] ? devkmsg_release+0x11c/0x11c [ 318.133459][T13261] ? show_regs_print_info+0x12/0x12 [ 318.138657][T13261] should_fail+0x6fb/0x860 [ 318.143077][T13261] ? setup_fault_attr+0x3d0/0x3d0 [ 318.148089][T13261] ? __down_read+0xf1/0x210 [ 318.152566][T13261] ? mutex_lock+0xa6/0x110 [ 318.156953][T13261] ? __list_lru_init+0xa7/0x570 [ 318.161773][T13261] should_failslab+0x5/0x20 [ 318.166248][T13261] kmem_cache_alloc_trace+0x39/0x290 [ 318.171504][T13261] __list_lru_init+0xa7/0x570 [ 318.176154][T13261] ? prealloc_shrinker+0x1cc/0x210 [ 318.181235][T13261] alloc_super+0x64d/0x760 [ 318.185619][T13261] ? mount_bdev+0x340/0x340 [ 318.190106][T13261] sget+0x20e/0x4e0 [ 318.193891][T13261] ? test_bdev_super+0x40/0x40 [ 318.198815][T13261] mount_bdev+0xe3/0x340 [ 318.203063][T13261] ? kill_f2fs_super+0x330/0x330 [ 318.207972][T13261] legacy_get_tree+0xde/0x170 [ 318.212621][T13261] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 318.218658][T13261] vfs_get_tree+0x85/0x260 [ 318.223046][T13261] do_mount+0x18ab/0x2660 [ 318.227348][T13261] ? copy_mount_string+0x30/0x30 [ 318.232294][T13261] ? copy_mount_options+0x1f8/0x320 [ 318.237487][T13261] ? __sanitizer_cov_trace_const_cmp4+0x22/0x90 [ 318.243698][T13261] ? copy_mount_options+0x293/0x320 [ 318.248864][T13261] ksys_mount+0xc2/0xf0 [ 318.252997][T13261] __x64_sys_mount+0xb1/0xc0 [ 318.257558][T13261] do_syscall_64+0xcb/0x150 [ 318.262032][T13261] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.267907][T13261] RIP: 0033:0x460c6a [ 318.271787][T13261] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 318.291359][T13261] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 318.299738][T13261] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 318.307679][T13261] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 318.315619][T13261] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 318.323558][T13261] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 318.331499][T13261] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x80, 0xf9) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX]) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup(r2) 03:00:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0xe0}}, 0x14}}, 0x0) 03:00:55 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf401}, 0x0) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x4000, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:55 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) 03:00:55 executing program 0 (fault-call:2 fault-nth:52): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:55 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x20480}, 0x0) 03:00:55 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x6000000000000000}, 0x0) 03:00:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:00:55 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x6000, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:56 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) [ 318.648121][T13284] tmpfs: Unknown parameter '0xffffffffffffffff' [ 318.671710][T13285] FAULT_INJECTION: forcing a failure. [ 318.671710][T13285] name failslab, interval 1, probability 0, space 0, times 0 [ 318.704345][T13285] CPU: 1 PID: 13285 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 318.714525][T13285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.724577][T13285] Call Trace: [ 318.727865][T13285] dump_stack+0x1dd/0x24e [ 318.732198][T13285] ? devkmsg_release+0x11c/0x11c [ 318.737193][T13285] ? show_regs_print_info+0x12/0x12 [ 318.742375][T13285] should_fail+0x6fb/0x860 [ 318.746776][T13285] ? setup_fault_attr+0x3d0/0x3d0 [ 318.751841][T13285] ? __down_read+0xf1/0x210 [ 318.756325][T13285] ? mutex_lock+0xa6/0x110 [ 318.760714][T13285] ? __list_lru_init+0xa7/0x570 [ 318.765534][T13285] should_failslab+0x5/0x20 [ 318.770018][T13285] kmem_cache_alloc_trace+0x39/0x290 [ 318.775286][T13285] __list_lru_init+0xa7/0x570 [ 318.779945][T13285] ? prealloc_shrinker+0x1cc/0x210 [ 318.785027][T13285] alloc_super+0x64d/0x760 [ 318.789421][T13285] ? mount_bdev+0x340/0x340 [ 318.793898][T13285] sget+0x20e/0x4e0 [ 318.797728][T13285] ? test_bdev_super+0x40/0x40 [ 318.802462][T13285] mount_bdev+0xe3/0x340 [ 318.806795][T13285] ? kill_f2fs_super+0x330/0x330 [ 318.811720][T13285] legacy_get_tree+0xde/0x170 [ 318.816381][T13285] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 318.822420][T13285] vfs_get_tree+0x85/0x260 [ 318.826808][T13285] do_mount+0x18ab/0x2660 [ 318.831109][T13285] ? copy_mount_string+0x30/0x30 [ 318.836045][T13285] ? call_function_single_interrupt+0xa/0x20 [ 318.842001][T13285] ? copy_mount_options+0x220/0x320 [ 318.847171][T13285] ? copy_mount_options+0x293/0x320 [ 318.852342][T13285] ksys_mount+0xc2/0xf0 [ 318.856473][T13285] __x64_sys_mount+0xb1/0xc0 [ 318.861041][T13285] do_syscall_64+0xcb/0x150 [ 318.865518][T13285] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.871384][T13285] RIP: 0033:0x460c6a [ 318.875260][T13285] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 318.894852][T13285] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:00:56 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x8000000000000000}, 0x0) [ 318.903234][T13285] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 318.911178][T13285] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 318.919123][T13285] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 318.927068][T13285] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 318.935017][T13285] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:56 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x2}}, 0x14}}, 0x0) 03:00:56 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x7800, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:56 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x40000}, 0x0) 03:00:56 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe000000000000000}, 0x0) 03:00:56 executing program 0 (fault-call:2 fault-nth:53): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000000)=""/74, 0x4a}, {&(0x7f0000000080)=""/47, 0x2f}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/43, 0x2b}], 0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="65765c722c00768b6043cebfc52fd4310927a2762bebac16ea8d52cbc2efe14cce2e1d569e4784fc075843d7cdf3686a6a3c345ee8b44615c396942a9e29c42b35c3af1e39bf0ec118e2b600640400"/104]) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r3, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r3, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) dup(r3) preadv2(r2, &(0x7f0000000340)=[{&(0x7f00000025c0)=""/4096, 0x1000}], 0x1, 0x80, 0x7, 0x2) 03:00:56 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x3}}, 0x14}}, 0x0) 03:00:56 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x80fe, @loopback={0x0, 0xac141409}}, 0x1c) [ 319.471613][T13284] tmpfs: Unknown parameter '0xffffffffffffffff' [ 319.505619][T13323] FAULT_INJECTION: forcing a failure. [ 319.505619][T13323] name failslab, interval 1, probability 0, space 0, times 0 03:00:56 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 03:00:56 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) [ 319.528877][T13323] CPU: 0 PID: 13323 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 319.539053][T13323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.549247][T13323] Call Trace: [ 319.552609][T13323] dump_stack+0x1dd/0x24e [ 319.556936][T13323] ? devkmsg_release+0x11c/0x11c [ 319.561881][T13323] ? show_regs_print_info+0x12/0x12 [ 319.567071][T13323] ? stack_trace_save+0x120/0x1f0 [ 319.572072][T13323] ? stack_trace_snprint+0x150/0x150 [ 319.577364][T13323] ? stack_trace_save+0x120/0x1f0 [ 319.582381][T13323] should_fail+0x6fb/0x860 [ 319.586781][T13323] ? setup_fault_attr+0x3d0/0x3d0 [ 319.591823][T13323] ? __kasan_kmalloc+0x189/0x1c0 [ 319.596746][T13323] ? f2fs_fill_super+0xca/0x9b20 [ 319.601654][T13323] should_failslab+0x5/0x20 [ 319.606149][T13323] kmem_cache_alloc_trace+0x39/0x290 [ 319.611406][T13323] ? widen_string+0x3a/0x360 [ 319.615987][T13323] ? string+0x280/0x2c0 [ 319.620115][T13323] f2fs_fill_super+0xca/0x9b20 [ 319.624852][T13323] ? pointer+0x222/0xae0 [ 319.629065][T13323] ? string+0x2c0/0x2c0 [ 319.633192][T13323] ? vsnprintf+0x1ba3/0x1c50 [ 319.637753][T13323] ? ptr_to_hashval+0x60/0x60 [ 319.642400][T13323] ? idr_replace+0x1c4/0x230 [ 319.646978][T13323] ? snprintf+0xd6/0x120 [ 319.651208][T13323] ? up_read+0x10/0x10 [ 319.655255][T13323] ? kill_f2fs_super+0x330/0x330 [ 319.660164][T13323] ? mount_bdev+0x340/0x340 [ 319.664638][T13323] mount_bdev+0x22d/0x340 [ 319.668939][T13323] ? kill_f2fs_super+0x330/0x330 [ 319.673849][T13323] legacy_get_tree+0xde/0x170 [ 319.678496][T13323] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 319.684549][T13323] vfs_get_tree+0x85/0x260 [ 319.688951][T13323] do_mount+0x18ab/0x2660 [ 319.693278][T13323] ? copy_mount_string+0x30/0x30 [ 319.698207][T13323] ? copy_mount_options+0x59/0x320 [ 319.703293][T13323] ? copy_mount_options+0x293/0x320 [ 319.708462][T13323] ksys_mount+0xc2/0xf0 [ 319.712617][T13323] __x64_sys_mount+0xb1/0xc0 [ 319.717177][T13323] do_syscall_64+0xcb/0x150 [ 319.721662][T13323] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.727528][T13323] RIP: 0033:0x460c6a [ 319.731395][T13323] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 319.751017][T13323] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 319.759402][T13323] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 319.767343][T13323] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:00:57 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x4}}, 0x14}}, 0x0) 03:00:57 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 03:00:57 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa005, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:57 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) 03:00:57 executing program 0 (fault-call:2 fault-nth:54): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 319.775286][T13323] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 319.783226][T13323] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 319.791168][T13323] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 319.810595][T13334] tmpfs: Unknown parameter 'ev\r' 03:00:57 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xc805, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:57 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x5}}, 0x14}}, 0x0) 03:00:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r3, 0x40309439, &(0x7f0000000000)={0x4, 0x2, 0x8}) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000140)="d9b590686c8eea11b252da2cff9d647ee30679655089902da4d78521a925b742805f2192a79c312390ffc4c3dc4f4ebca706bef412fe9d3c8d97fa7bfb11d1b90d54b8bd011ed6e881da19128f1ab50c338f59b598a80dd83d20a8e47b6d1f6427f78365f2004139c316434ed64b9240ef9351f8b8a2ce0dbd7fd6979bb7de7c8f4e6194c82935d063b2631c0f1f67a971e229e7ae27d165e5d5de86bc61067f53414794c8d188fc8acbb507", 0xac}, {&(0x7f0000000040)="f6d632eab004b810ea76f950160d7f06c7e9bd6f546132a5bee595aa66a3ad96d490618cf2dbae53b36286d1d882c81ccfe2465f0695afae52cfd153c74ba7781302cafb9ad79d3f484ec930dc0e755ec17c4e7d50505d0f3943dadca11550ee13b2cc14b904fb9e8c0862a306d30c23800c811b51", 0x75}, {&(0x7f0000000240)="9a743a79e0ccde4f125bf28987fdb66c836ba48bce12c0cb4b6f7246d2a1ee8cff5045ba113b86b231e7e7e211f38b28fb214c069313e8b4762ddc10cefa32c208016381f0e621", 0x47}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f0000000480)="edfeae439eae0e5b12949aea2becf8f832e898e1e5a29e6aaf71bf3ac456cb48d91478eff23ddb9e1c6dce80d86e2570886324c244897d1f5d55fbbe08fbe71cb4d2aa9e95f63aa0982fb62e2a1663bf46928551b6be580704dc0b015c383b72d75411e553efe467e8f681a3a3d7667a301d9915583bb5b2419b65653dc591a23f4708e74858d9fc63eb17e0884b4443ceb341f27ca26f18cc25ae0ccbef827ee7a25c41c5b3917469d5cb0a6f00ea7e248b7536e6dc646199022a4e53f92f319f0c430d29409709e5ce86", 0xcb}, {&(0x7f0000000380)="0360cad68672738c435b19f56660e848c740ade93ea0a4c348f1cc497949212e7c5a19ad747261192d0d8e954a883974c40b474f22b80623a9d36949", 0x3c}], 0x6) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) 03:00:57 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}}, 0x0) [ 319.868297][T13355] FAULT_INJECTION: forcing a failure. [ 319.868297][T13355] name failslab, interval 1, probability 0, space 0, times 0 [ 319.881646][T13355] CPU: 0 PID: 13355 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 319.891804][T13355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.901857][T13355] Call Trace: [ 319.905154][T13355] dump_stack+0x1dd/0x24e [ 319.909476][T13355] ? devkmsg_release+0x11c/0x11c [ 319.914407][T13355] ? mount_bdev+0x22d/0x340 [ 319.918920][T13355] ? show_regs_print_info+0x12/0x12 [ 319.924114][T13355] ? ksys_mount+0xc2/0xf0 [ 319.928439][T13355] ? do_syscall_64+0xcb/0x150 [ 319.933111][T13355] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 319.939176][T13355] should_fail+0x6fb/0x860 [ 319.943588][T13355] ? setup_fault_attr+0x3d0/0x3d0 [ 319.948642][T13355] ? __up_read+0x6f/0x1b0 [ 319.952945][T13355] ? __down_read+0x210/0x210 [ 319.957572][T13355] ? kzalloc+0x1b/0x30 [ 319.961623][T13355] should_failslab+0x5/0x20 [ 319.966108][T13355] __kmalloc+0x5f/0x2d0 [ 319.970281][T13355] kzalloc+0x1b/0x30 [ 319.974151][T13355] crypto_create_tfm+0x6c/0x2e0 [ 319.978985][T13355] ? crypto_alg_mod_lookup+0x4cf/0x7f0 [ 319.984413][T13355] crypto_alloc_tfm+0x16b/0x2e0 [ 319.989263][T13355] f2fs_fill_super+0x2a7/0x9b20 [ 319.994087][T13355] ? pointer+0x222/0xae0 [ 319.998298][T13355] ? string+0x2c0/0x2c0 [ 320.002440][T13355] ? snprintf+0xd6/0x120 [ 320.006652][T13355] ? up_read+0x10/0x10 [ 320.010698][T13355] ? kill_f2fs_super+0x330/0x330 [ 320.015616][T13355] ? mount_bdev+0x340/0x340 [ 320.020092][T13355] mount_bdev+0x22d/0x340 [ 320.024396][T13355] ? kill_f2fs_super+0x330/0x330 [ 320.029320][T13355] legacy_get_tree+0xde/0x170 [ 320.033983][T13355] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 320.040021][T13355] vfs_get_tree+0x85/0x260 [ 320.044407][T13355] do_mount+0x18ab/0x2660 [ 320.048706][T13355] ? copy_mount_string+0x30/0x30 [ 320.053612][T13355] ? copy_mount_options+0x59/0x320 [ 320.058692][T13355] ? copy_mount_options+0x293/0x320 [ 320.063860][T13355] ksys_mount+0xc2/0xf0 [ 320.067999][T13355] __x64_sys_mount+0xb1/0xc0 [ 320.072668][T13355] do_syscall_64+0xcb/0x150 [ 320.077197][T13355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.083078][T13355] RIP: 0033:0x460c6a [ 320.086953][T13355] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 320.106527][T13355] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:00:57 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) 03:00:57 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) 03:00:57 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x6}}, 0x14}}, 0x0) 03:00:57 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xfc00, @loopback={0x0, 0xac141409}}, 0x1c) [ 320.114920][T13355] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 320.122883][T13355] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 320.130825][T13355] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 320.138765][T13355] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 320.146711][T13355] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 320.162338][T13355] F2FS-fs (loop0): Cannot load crc32 driver. 03:00:57 executing program 0 (fault-call:2 fault-nth:55): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:57 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) 03:00:57 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) 03:00:57 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xfe80, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:57 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x8}}, 0x14}}, 0x0) 03:00:57 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) [ 320.247196][T13386] FAULT_INJECTION: forcing a failure. [ 320.247196][T13386] name failslab, interval 1, probability 0, space 0, times 0 [ 320.276292][T13386] CPU: 0 PID: 13386 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 320.286506][T13386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.296553][T13386] Call Trace: [ 320.299836][T13386] dump_stack+0x1dd/0x24e [ 320.304156][T13386] ? devkmsg_release+0x11c/0x11c [ 320.309095][T13386] ? show_regs_print_info+0x12/0x12 [ 320.314288][T13386] should_fail+0x6fb/0x860 [ 320.318698][T13386] ? setup_fault_attr+0x3d0/0x3d0 [ 320.323728][T13386] ? crypto_shash_init_tfm+0xf5/0x180 [ 320.329073][T13386] ? crypto_create_tfm+0x288/0x2e0 [ 320.334155][T13386] ? f2fs_fill_super+0x3be/0x9b20 [ 320.339169][T13386] should_failslab+0x5/0x20 [ 320.343647][T13386] kmem_cache_alloc_trace+0x39/0x290 [ 320.348903][T13386] f2fs_fill_super+0x3be/0x9b20 [ 320.353726][T13386] ? pointer+0x222/0xae0 [ 320.357956][T13386] ? string+0x2c0/0x2c0 [ 320.362083][T13386] ? snprintf+0xd6/0x120 [ 320.366294][T13386] ? up_read+0x10/0x10 [ 320.370342][T13386] ? kill_f2fs_super+0x330/0x330 [ 320.375254][T13386] ? mount_bdev+0x340/0x340 [ 320.379724][T13386] mount_bdev+0x22d/0x340 [ 320.384025][T13386] ? kill_f2fs_super+0x330/0x330 [ 320.388932][T13386] legacy_get_tree+0xde/0x170 [ 320.394102][T13386] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 320.400138][T13386] vfs_get_tree+0x85/0x260 [ 320.404525][T13386] do_mount+0x18ab/0x2660 [ 320.408829][T13386] ? copy_mount_string+0x30/0x30 [ 320.413735][T13386] ? copy_mount_options+0x1f8/0x320 [ 320.418913][T13386] ? audit_tree_destroy_watch+0x20/0x20 [ 320.424430][T13386] ? copy_mount_options+0x293/0x320 [ 320.429600][T13386] ksys_mount+0xc2/0xf0 [ 320.433744][T13386] __x64_sys_mount+0xb1/0xc0 [ 320.438307][T13386] do_syscall_64+0xcb/0x150 [ 320.442783][T13386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.448645][T13386] RIP: 0033:0x460c6a [ 320.452509][T13386] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 320.472085][T13386] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 320.480484][T13386] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 320.488428][T13386] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 320.496372][T13386] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 320.504333][T13386] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 320.512279][T13386] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402000, 0x0) getsockname$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:00:58 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xff00, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:58 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:00:58 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0xa}}, 0x14}}, 0x0) 03:00:58 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x5000000}, 0x0) 03:00:58 executing program 0 (fault-call:2 fault-nth:56): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:58 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0xf}}, 0x14}}, 0x0) 03:00:58 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) 03:00:58 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x100000, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:58 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x6000000}, 0x0) [ 321.018834][T13414] FAULT_INJECTION: forcing a failure. [ 321.018834][T13414] name failslab, interval 1, probability 0, space 0, times 0 [ 321.046101][T13414] CPU: 0 PID: 13414 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 321.056273][T13414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.066325][T13414] Call Trace: [ 321.069615][T13414] dump_stack+0x1dd/0x24e [ 321.073942][T13414] ? devkmsg_release+0x11c/0x11c [ 321.078895][T13414] ? show_regs_print_info+0x12/0x12 [ 321.084095][T13414] ? mem_cgroup_charge_statistics+0x138/0x1a0 [ 321.090175][T13414] should_fail+0x6fb/0x860 [ 321.094624][T13414] ? setup_fault_attr+0x3d0/0x3d0 [ 321.099636][T13414] ? xas_load+0x46f/0x4c0 [ 321.104047][T13414] ? mempool_alloc_slab+0x16/0x30 [ 321.109040][T13414] ? mempool_free+0x380/0x380 [ 321.113688][T13414] should_failslab+0x5/0x20 [ 321.118162][T13414] kmem_cache_alloc+0x36/0x270 [ 321.122898][T13414] ? check_preemption_disabled+0x9e/0x330 [ 321.128605][T13414] ? mempool_free+0x380/0x380 [ 321.133256][T13414] mempool_alloc_slab+0x16/0x30 [ 321.138079][T13414] mempool_alloc+0x113/0x680 [ 321.142646][T13414] ? mempool_resize+0x910/0x910 [ 321.147469][T13414] ? __find_get_block+0xc32/0x10c0 [ 321.152551][T13414] bio_alloc_bioset+0x209/0x690 [ 321.157388][T13414] ? write_boundary_block+0x150/0x150 [ 321.162728][T13414] ? _raw_spin_lock+0xa3/0x1b0 [ 321.167478][T13414] ? bio_chain_endio+0xf0/0xf0 [ 321.172210][T13414] ? init_page_buffers+0x377/0x3a0 [ 321.177302][T13414] submit_bh_wbc+0x1ba/0x790 [ 321.181862][T13414] __bread_gfp+0x181/0x310 [ 321.186247][T13414] f2fs_fill_super+0x477/0x9b20 [ 321.191072][T13414] ? string+0x2c0/0x2c0 [ 321.195214][T13414] ? snprintf+0xd6/0x120 [ 321.199425][T13414] ? up_read+0x10/0x10 [ 321.203478][T13414] ? kill_f2fs_super+0x330/0x330 [ 321.208385][T13414] ? mount_bdev+0x340/0x340 [ 321.212876][T13414] mount_bdev+0x22d/0x340 [ 321.217194][T13414] ? kill_f2fs_super+0x330/0x330 [ 321.222104][T13414] legacy_get_tree+0xde/0x170 [ 321.226751][T13414] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 321.232793][T13414] vfs_get_tree+0x85/0x260 [ 321.237181][T13414] do_mount+0x18ab/0x2660 [ 321.241479][T13414] ? copy_mount_string+0x30/0x30 [ 321.246402][T13414] ? copy_mount_options+0x59/0x320 [ 321.251481][T13414] ? copy_mount_options+0x293/0x320 [ 321.256652][T13414] ksys_mount+0xc2/0xf0 [ 321.260784][T13414] __x64_sys_mount+0xb1/0xc0 [ 321.265341][T13414] do_syscall_64+0xcb/0x150 [ 321.269816][T13414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.275691][T13414] RIP: 0033:0x460c6a [ 321.279555][T13414] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 321.299143][T13414] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 321.307522][T13414] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a 03:00:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 321.315461][T13414] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 321.323401][T13414] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 321.331339][T13414] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 321.339281][T13414] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 321.354779][T13414] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:00:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)={'syz0', "3a9fba1e29e9639c7f295f961a06b5e502e668b45c3b73add1c06895d3be2085fb4670adc237cd7f47640dc78e8acb5376f39ded29b41060d50424e6c0b0126c5a014798571f297a2f22a40f160b1957794369bcdf7b99a201a318d2e442c0a54a98a4acd70230b9c34983a5a889"}, 0x72) statx(r2, &(0x7f0000000040)='./file0\x00', 0x100, 0x200, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10001, &(0x7f0000000340)=ANY=[@ANYBLOB='mode=00000000000000000000003,smackfsdef=-,hash,rootcontext=staff_u,smackfsfloor=,uid=', @ANYRES16=r4, @ANYBLOB="2cc21e7f3ffb660f898c0c294c04b8885fbc60c8bbb6af55384ae7d4496edc216460052bd5dfc2d985238c97d642691727cc67831860e8ebb62d15cfa9f412b5793b37b00c5fe0355be6cfc91377f63374042acd0e90406b6281228f603f21ded0c954657356da4372", @ANYRESDEC=r4, @ANYBLOB=',\x00']) 03:00:58 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xf0ff7f, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:58 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x11}}, 0x14}}, 0x0) [ 321.370068][T13414] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 321.391908][T13414] F2FS-fs (loop0): invalid crc_offset: 0 03:00:58 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x8000000}, 0x0) 03:00:58 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) 03:00:58 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x1000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 321.429730][T13414] F2FS-fs (loop0): invalid crc_offset: 0 [ 321.456003][T13414] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 321.497559][T13462] tmpfs: Unknown parameter 'smackfsdef' 03:00:58 executing program 0 (fault-call:2 fault-nth:57): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:00:58 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x14}}, 0x14}}, 0x0) 03:00:58 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) 03:00:58 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xa000000}, 0x0) 03:00:58 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:58 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) [ 321.582411][T13475] FAULT_INJECTION: forcing a failure. [ 321.582411][T13475] name failslab, interval 1, probability 0, space 0, times 0 [ 321.607935][T13475] CPU: 1 PID: 13475 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 321.618111][T13475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.628162][T13475] Call Trace: [ 321.631439][T13475] dump_stack+0x1dd/0x24e [ 321.635748][T13475] ? devkmsg_release+0x11c/0x11c [ 321.640780][T13475] ? show_regs_print_info+0x12/0x12 [ 321.645958][T13475] should_fail+0x6fb/0x860 [ 321.650349][T13475] ? setup_fault_attr+0x3d0/0x3d0 [ 321.655348][T13475] ? crypto_shash_init_tfm+0xf5/0x180 [ 321.660697][T13475] ? crypto_create_tfm+0x288/0x2e0 [ 321.665812][T13475] ? f2fs_fill_super+0x3be/0x9b20 [ 321.670817][T13475] should_failslab+0x5/0x20 [ 321.675306][T13475] kmem_cache_alloc_trace+0x39/0x290 [ 321.680579][T13475] f2fs_fill_super+0x3be/0x9b20 [ 321.685414][T13475] ? pointer+0x222/0xae0 [ 321.689631][T13475] ? string+0x2c0/0x2c0 [ 321.693772][T13475] ? snprintf+0xd6/0x120 [ 321.698002][T13475] ? up_read+0x10/0x10 [ 321.702042][T13475] ? kill_f2fs_super+0x330/0x330 [ 321.706949][T13475] ? mount_bdev+0x340/0x340 [ 321.711435][T13475] mount_bdev+0x22d/0x340 [ 321.715789][T13475] ? kill_f2fs_super+0x330/0x330 [ 321.720706][T13475] legacy_get_tree+0xde/0x170 [ 321.725359][T13475] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 321.731402][T13475] vfs_get_tree+0x85/0x260 [ 321.735795][T13475] do_mount+0x18ab/0x2660 [ 321.740115][T13475] ? copy_mount_string+0x30/0x30 [ 321.745024][T13475] ? retint_kernel+0x1b/0x1b [ 321.749589][T13475] ? copy_mount_options+0x1ec/0x320 [ 321.754775][T13475] ? copy_mount_options+0x293/0x320 [ 321.759950][T13475] ksys_mount+0xc2/0xf0 [ 321.764081][T13475] __x64_sys_mount+0xb1/0xc0 [ 321.768655][T13475] do_syscall_64+0xcb/0x150 [ 321.773143][T13475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.779092][T13475] RIP: 0033:0x460c6a [ 321.782965][T13475] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 321.802545][T13475] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 321.810927][T13475] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 321.818871][T13475] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 321.826817][T13475] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 321.834764][T13475] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 321.842705][T13475] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:00:59 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x3000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:00:59 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x30}}, 0x14}}, 0x0) 03:00:59 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x0) 03:00:59 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x11000000}, 0x0) 03:00:59 executing program 0 (fault-call:2 fault-nth:58): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 322.290071][T13497] FAULT_INJECTION: forcing a failure. [ 322.290071][T13497] name failslab, interval 1, probability 0, space 0, times 0 [ 322.302693][T13497] CPU: 1 PID: 13497 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 322.312827][T13497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.322857][T13497] Call Trace: [ 322.326126][T13497] dump_stack+0x1dd/0x24e [ 322.330428][T13497] ? devkmsg_release+0x11c/0x11c [ 322.335337][T13497] ? check_preemption_disabled+0x9e/0x330 [ 322.341024][T13497] ? show_regs_print_info+0x12/0x12 [ 322.346189][T13497] ? debug_smp_processor_id+0x20/0x20 [ 322.351526][T13497] ? check_preemption_disabled+0x9e/0x330 [ 322.357210][T13497] ? mod_delayed_work_on+0x131/0x190 [ 322.362461][T13497] should_fail+0x6fb/0x860 [ 322.366843][T13497] ? setup_fault_attr+0x3d0/0x3d0 [ 322.371834][T13497] ? check_preemption_disabled+0x15a/0x330 [ 322.377624][T13497] ? debug_smp_processor_id+0x20/0x20 [ 322.382974][T13497] ? xas_create+0x4f9/0x1360 [ 322.387531][T13497] should_failslab+0x5/0x20 [ 322.392004][T13497] kmem_cache_alloc+0x36/0x270 [ 322.396747][T13497] ? check_preemption_disabled+0x9e/0x330 [ 322.402434][T13497] xas_create+0x4f9/0x1360 [ 322.406819][T13497] xas_store+0x93/0x13b0 [ 322.411030][T13497] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 322.416109][T13497] ? _raw_spin_lock_irqsave+0x210/0x210 [ 322.421625][T13497] ? xas_load+0x46f/0x4c0 [ 322.425947][T13497] __add_to_page_cache_locked+0x3e0/0x8e0 [ 322.431647][T13497] ? replace_page_cache_page+0x560/0x560 [ 322.437261][T13497] ? workingset_activation+0x150/0x150 [ 322.442684][T13497] ? __alloc_pages_nodemask+0x374/0x7c0 [ 322.448211][T13497] add_to_page_cache_lru+0x11d/0x280 [ 322.453463][T13497] ? add_to_page_cache_locked+0x40/0x40 [ 322.458974][T13497] ? write_boundary_block+0x150/0x150 [ 322.464311][T13497] pagecache_get_page+0x5ea/0x8a0 [ 322.469302][T13497] ? out_of_line_wait_on_bit+0x1c3/0x240 [ 322.474898][T13497] ? bit_wait+0x90/0x90 [ 322.479021][T13497] __getblk_gfp+0x208/0x750 [ 322.483493][T13497] __bread_gfp+0x2a/0x310 [ 322.487819][T13497] f2fs_fill_super+0x477/0x9b20 [ 322.492644][T13497] ? snprintf+0xd6/0x120 [ 322.496869][T13497] ? up_read+0x10/0x10 [ 322.500906][T13497] ? kill_f2fs_super+0x330/0x330 [ 322.505824][T13497] ? mount_bdev+0x340/0x340 [ 322.510307][T13497] mount_bdev+0x22d/0x340 [ 322.514609][T13497] ? kill_f2fs_super+0x330/0x330 [ 322.519515][T13497] legacy_get_tree+0xde/0x170 [ 322.524265][T13497] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 322.530297][T13497] vfs_get_tree+0x85/0x260 [ 322.534682][T13497] do_mount+0x18ab/0x2660 [ 322.538979][T13497] ? copy_mount_string+0x30/0x30 [ 322.543885][T13497] ? copy_mount_options+0x59/0x320 [ 322.548963][T13497] ? copy_mount_options+0x293/0x320 [ 322.554141][T13497] ksys_mount+0xc2/0xf0 [ 322.558265][T13497] __x64_sys_mount+0xb1/0xc0 [ 322.562820][T13497] do_syscall_64+0xcb/0x150 [ 322.567339][T13497] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.573240][T13497] RIP: 0033:0x460c6a [ 322.577126][T13497] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 322.596700][T13497] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 322.605076][T13497] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 322.613032][T13497] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 322.620972][T13497] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 322.628911][T13497] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 03:00:59 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x60}}, 0x14}}, 0x0) 03:00:59 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x60}, 0x0) 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x4000000, @loopback={0x0, 0xac141409}}, 0x1c) [ 322.636852][T13497] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 322.645338][T13497] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 322.667110][T13497] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 322.683512][T13497] F2FS-fs (loop0): invalid crc_offset: 0 03:01:00 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x14000000}, 0x0) 03:01:00 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fdatasync(r1) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d2d6c4020746d70667300206e6c38303231310020746d706673000ae44732f0e099637be8d95be275c6731ac4aeef3cdaa5332c971aebedb8a1884083c87915ffa65f8e264d802fe5977788c74750815400"], 0x5d) r3 = dup3(r1, r1, 0x80000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000028bd7000fedbdf258200000008000300", @ANYRES32=0x0, @ANYBLOB="df9e6a20dd8a1cff99b454e1dafb09a1138227215176d47c390f276f2de5bffbe66058f332a84ed4ebfd9b7d"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000540)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="34ff0000c47fd140", @ANYRES16=r4, @ANYBLOB="01002abd7000fddbdf254b0000000c009900070000000a000000940084803c00068008000000020000000800000000010000080001000800000008000000090000000800030009000000080003000100000008000100030000000a00050071000063d4aa00000a00050050505050505000003400068008000300020000000800020004000000080001000000000008000000ff0700000800010009000000080002000100000008000200b20d0000"], 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0xc1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020029bd7068ffdbdf250000000008000700", @ANYRES32=r5, @ANYBLOB="0c009900030000004b0000000a000600ffffffffffff00000a001a00ffffffffffff00000a001a0008021100000100000a001a0008021100000000000a0006000802110000010000"], 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x20004014) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000640)="7d64c7ee2477cb031ebd30d3349de2187767c13f9a03bc853f9cec86a8656f83a763810a83535c6f324f4feece2669cfa88cd85a62ea9c0beede4b4fded55bd5f51f66e92df09c57bcf4a604cd45bd0100fffffffffffffd852111910bef18"}], 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r8, 0xc0389423, &(0x7f00000004c0)={0x8001, 0x18, [0xc34, 0x9, 0x1, 0x5], &(0x7f0000000480)=[0x0, 0x0, 0x0]}) 03:01:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0xe0}, 0x0) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0xe0}}, 0x14}}, 0x0) 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x5000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 322.692759][T13497] F2FS-fs (loop0): invalid crc_offset: 0 [ 322.710324][T13497] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:01:00 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x30000000}, 0x0) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f}, 0x14}}, 0x0) 03:01:00 executing program 0 (fault-call:2 fault-nth:59): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x6000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x2}}, 0x14}}, 0x0) 03:01:00 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) [ 322.891271][T13551] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 322.908200][T13551] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 322.926117][T13551] FAULT_INJECTION: forcing a failure. [ 322.926117][T13551] name failslab, interval 1, probability 0, space 0, times 0 [ 322.939105][T13551] CPU: 0 PID: 13551 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 322.949370][T13551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.959410][T13551] Call Trace: [ 322.962678][T13551] dump_stack+0x1dd/0x24e [ 322.966996][T13551] ? devkmsg_release+0x11c/0x11c [ 322.971904][T13551] ? show_regs_print_info+0x12/0x12 [ 322.977092][T13551] should_fail+0x6fb/0x860 [ 322.981479][T13551] ? setup_fault_attr+0x3d0/0x3d0 [ 322.986473][T13551] ? f2fs_fill_super+0x9b20/0x9b20 [ 322.991558][T13551] ? make_kgid+0x228/0x3a0 [ 322.995965][T13551] ? f2fs_kmalloc+0x1b/0x30 [ 323.000439][T13551] should_failslab+0x5/0x20 [ 323.004920][T13551] __kmalloc+0x5f/0x2d0 [ 323.009051][T13551] f2fs_kmalloc+0x1b/0x30 [ 323.013367][T13551] f2fs_fill_super+0x3a46/0x9b20 [ 323.018281][T13551] ? snprintf+0xd6/0x120 [ 323.022496][T13551] ? up_read+0x10/0x10 [ 323.026540][T13551] ? kill_f2fs_super+0x330/0x330 [ 323.031461][T13551] ? mount_bdev+0x340/0x340 [ 323.035943][T13551] mount_bdev+0x22d/0x340 [ 323.040256][T13551] ? kill_f2fs_super+0x330/0x330 [ 323.045172][T13551] legacy_get_tree+0xde/0x170 [ 323.049821][T13551] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 323.055858][T13551] vfs_get_tree+0x85/0x260 [ 323.060247][T13551] do_mount+0x18ab/0x2660 [ 323.064693][T13551] ? copy_mount_string+0x30/0x30 [ 323.069601][T13551] ? copy_mount_options+0x59/0x320 [ 323.074682][T13551] ? copy_mount_options+0x293/0x320 [ 323.079851][T13551] ksys_mount+0xc2/0xf0 [ 323.083980][T13551] __x64_sys_mount+0xb1/0xc0 [ 323.088543][T13551] do_syscall_64+0xcb/0x150 [ 323.093027][T13551] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.098899][T13551] RIP: 0033:0x460c6a [ 323.102826][T13551] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 323.122415][T13551] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 323.130801][T13551] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 323.138746][T13551] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 323.146688][T13551] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 323.154645][T13551] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 323.162586][T13551] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000600), 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto$inet(r1, &(0x7f0000000000)="6565a65cf9a4b942db48b2423bb8bdb42b54baeaa9c395c6e6c60bd9f0d6cf8f55f49e505ce7105cfb741178e68ff2d96600313125e28b7c58572c1c132df949fb4497aadbf5a2bc781731fdf97aca8373c9ddc6cfe7c0358d8dc19bcfe2ccf0b7aa54ae70d33d336c6da0261cc4bc0b698f4ff849", 0x75, 0x4008080, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) fcntl$getown(r0, 0x9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="687567653d6e090000002c20ed8fc94eda5f9fcf968261d049d8212cb7f56a15d447df0637bb0e0c2796687b8d1cdd18d86125000f29075a441355792b552da23ed7467f4ac226f762901bec7aaaecdbd9a9239edb5dc304b584edd6dc37b0254372b0081bdd43c07c54753aa85c8f23a486557ebdd7bb29ef89fa039786ff"]) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x3}}, 0x14}}, 0x0) 03:01:00 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x60000000}, 0x0) 03:01:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x1100}, 0x0) 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x7000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:00 executing program 0 (fault-call:2 fault-nth:60): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x8000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) 03:01:00 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x80040200}, 0x0) [ 323.606660][T13573] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 323.616517][T13573] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 323.630315][T13573] FAULT_INJECTION: forcing a failure. [ 323.630315][T13573] name failslab, interval 1, probability 0, space 0, times 0 03:01:00 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x9000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x1400}, 0x0) 03:01:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x5}}, 0x14}}, 0x0) [ 323.649845][T13573] CPU: 1 PID: 13573 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 323.660015][T13573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.670062][T13573] Call Trace: [ 323.673352][T13573] dump_stack+0x1dd/0x24e [ 323.677680][T13573] ? devkmsg_release+0x11c/0x11c [ 323.682615][T13573] ? show_regs_print_info+0x12/0x12 [ 323.687813][T13573] ? __wait_on_bit+0x177/0x190 [ 323.692577][T13573] should_fail+0x6fb/0x860 [ 323.696989][T13573] ? setup_fault_attr+0x3d0/0x3d0 [ 323.702039][T13573] ? vprintk_emit+0x3b1/0x500 [ 323.706686][T13573] ? __bpf_trace_f2fs_fiemap+0x50/0x50 [ 323.712126][T13573] ? make_kgid+0x228/0x3a0 [ 323.716515][T13573] ? f2fs_fill_super+0x3001/0x9b20 [ 323.721602][T13573] should_failslab+0x5/0x20 [ 323.726182][T13573] __kmalloc_track_caller+0x5d/0x2c0 [ 323.731458][T13573] kstrdup+0x31/0x70 [ 323.735336][T13573] f2fs_fill_super+0x3001/0x9b20 [ 323.740259][T13573] ? snprintf+0xd6/0x120 [ 323.744473][T13573] ? up_read+0x10/0x10 [ 323.748512][T13573] ? kill_f2fs_super+0x330/0x330 [ 323.753420][T13573] ? mount_bdev+0x340/0x340 [ 323.757893][T13573] mount_bdev+0x22d/0x340 [ 323.762196][T13573] ? kill_f2fs_super+0x330/0x330 [ 323.767112][T13573] legacy_get_tree+0xde/0x170 [ 323.771762][T13573] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 323.777798][T13573] vfs_get_tree+0x85/0x260 [ 323.782191][T13573] do_mount+0x18ab/0x2660 [ 323.786511][T13573] ? copy_mount_string+0x30/0x30 [ 323.791420][T13573] ? copy_mount_options+0x59/0x320 [ 323.796502][T13573] ? copy_mount_options+0x293/0x320 [ 323.801669][T13573] ksys_mount+0xc2/0xf0 [ 323.805797][T13573] __x64_sys_mount+0xb1/0xc0 [ 323.810364][T13573] do_syscall_64+0xcb/0x150 [ 323.814896][T13573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.820759][T13573] RIP: 0033:0x460c6a [ 323.824624][T13573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 323.844196][T13573] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 323.852577][T13573] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 323.860543][T13573] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 323.868484][T13573] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 323.876432][T13573] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 323.884382][T13573] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 323.949310][T13604] tmpfs: Bad value for 'huge' 03:01:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000040)=0x0) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80008, &(0x7f0000000400)=ANY=[@ANYBLOB="6e725f626c6f564f733d3634342c736d61636b66737472616e736d7574653dee23282c5e25272d2323277d7b2c657569643d1c752f8d848f898ed9061135385291b88c78fd5b8745afe8b63f3a", @ANYRESDEC=r2, @ANYBLOB="2c636f6e746578743d73797374656d5f752c004e556defff39989d36f9c37dbc1c1cf17071339eb0680b4e076d776e01d2f1378ce2498f3ad5ab83ca098ddf261945c1adf9e5d0f077975fa095262f519cfea9d4fed6489b9ddb8080bd9cb895157921e1ec2201917f7e12a3148e3cd7ba4f5561253e86bc1558a6822cf9bdc0a59643daf5cb1e11a88c2c48367d685a1134fc6f766237bc7a19809f1a6d0f6fe122f11ccb25507c2935a832ade8d77288f11f9fcab34a3f84e156d1be1751c38a1a9dceccc3ef7cc7492135c2b9c4c80299cab80e70f208c85c406ef6028e2e0cd696a6"]) 03:01:01 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe0000000}, 0x0) 03:01:01 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:01 executing program 0 (fault-call:2 fault-nth:61): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:01 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 03:01:01 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x6}}, 0x14}}, 0x0) [ 324.472942][T13605] tmpfs: Bad value for 'huge' 03:01:01 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 03:01:01 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xf000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:01 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x8}}, 0x14}}, 0x0) 03:01:01 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xe8030000}, 0x0) [ 324.499074][T13613] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 324.512380][T13613] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 324.528187][T13613] FAULT_INJECTION: forcing a failure. [ 324.528187][T13613] name failslab, interval 1, probability 0, space 0, times 0 03:01:01 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x10000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:01 executing program 4: sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000011c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="83a828bd7000fddbdf25690000000a0002f608021100000100000500d300070000000500d2c904bbf2000500d2000d000000"], 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={[], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) write(r0, &(0x7f0000000140)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x21) [ 324.558361][T13613] CPU: 1 PID: 13613 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 324.568540][T13613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.578595][T13613] Call Trace: [ 324.581886][T13613] dump_stack+0x1dd/0x24e [ 324.586216][T13613] ? devkmsg_release+0x11c/0x11c [ 324.591152][T13613] ? stack_trace_save+0x120/0x1f0 [ 324.596177][T13613] ? show_regs_print_info+0x12/0x12 [ 324.601378][T13613] ? stack_trace_snprint+0x150/0x150 03:01:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xa8) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) [ 324.605443][T13638] SELinux: duplicate or incompatible mount options [ 324.606660][T13613] ? __perf_event_task_sched_in+0x591/0x600 [ 324.606674][T13613] should_fail+0x6fb/0x860 [ 324.614570][T13639] SELinux: duplicate or incompatible mount options [ 324.619127][T13613] ? setup_fault_attr+0x3d0/0x3d0 [ 324.619143][T13613] ? match_token+0x6a2/0x710 [ 324.639703][T13613] ? parse_options+0x3f7/0x3a50 [ 324.644553][T13613] should_failslab+0x5/0x20 [ 324.649045][T13613] __kmalloc_track_caller+0x5d/0x2c0 [ 324.654307][T13613] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.660342][T13613] kmemdup_nul+0x27/0xa0 [ 324.664572][T13613] parse_options+0x3f7/0x3a50 [ 324.669219][T13613] ? f2fs_fill_super+0x9b20/0x9b20 [ 324.674301][T13613] ? make_kgid+0x228/0x3a0 [ 324.678698][T13613] ? __kmalloc_track_caller+0x20e/0x2c0 [ 324.684214][T13613] ? memcpy+0x38/0x50 [ 324.688185][T13613] f2fs_fill_super+0x303a/0x9b20 [ 324.693098][T13613] ? snprintf+0xd6/0x120 [ 324.697309][T13613] ? up_read+0x10/0x10 [ 324.701354][T13613] ? kill_f2fs_super+0x330/0x330 [ 324.706264][T13613] ? mount_bdev+0x340/0x340 [ 324.710734][T13613] mount_bdev+0x22d/0x340 [ 324.715030][T13613] ? kill_f2fs_super+0x330/0x330 [ 324.719971][T13613] legacy_get_tree+0xde/0x170 [ 324.724641][T13613] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 324.730674][T13613] vfs_get_tree+0x85/0x260 [ 324.735059][T13613] do_mount+0x18ab/0x2660 [ 324.739357][T13613] ? copy_mount_string+0x30/0x30 [ 324.744264][T13613] ? copy_mount_options+0x59/0x320 [ 324.749344][T13613] ? copy_mount_options+0x293/0x320 [ 324.754509][T13613] ksys_mount+0xc2/0xf0 [ 324.758632][T13613] __x64_sys_mount+0xb1/0xc0 [ 324.763192][T13613] do_syscall_64+0xcb/0x150 [ 324.767679][T13613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.773540][T13613] RIP: 0033:0x460c6a [ 324.777405][T13613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 324.796978][T13613] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0xa}}, 0x14}}, 0x0) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0xe000}, 0x0) 03:01:02 executing program 0 (fault-call:2 fault-nth:62): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x10000120, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xf4010000}, 0x0) [ 324.805376][T13613] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 324.813317][T13613] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 324.821255][T13613] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 324.829204][T13613] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 324.837147][T13613] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0xf}}, 0x14}}, 0x0) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x11000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) creat(&(0x7f0000000000)='./file0\x00', 0x5b) 03:01:02 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xfdffffff}, 0x0) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20010010, @loopback={0x0, 0xac141409}}, 0x1c) [ 324.908611][T13658] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 324.929010][T13658] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20020000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x11}}, 0x14}}, 0x0) 03:01:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffff1b, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000023e9cd30d67b76a4d92b21f4c0b10796c73bc5416f1882"]) [ 324.973250][T13658] FAULT_INJECTION: forcing a failure. [ 324.973250][T13658] name failslab, interval 1, probability 0, space 0, times 0 [ 325.027298][T13658] CPU: 1 PID: 13658 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 325.037487][T13658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.047536][T13658] Call Trace: [ 325.050830][T13658] dump_stack+0x1dd/0x24e [ 325.055160][T13658] ? devkmsg_release+0x11c/0x11c [ 325.060099][T13658] ? show_regs_print_info+0x12/0x12 [ 325.065300][T13658] should_fail+0x6fb/0x860 [ 325.069735][T13658] ? setup_fault_attr+0x3d0/0x3d0 [ 325.074741][T13658] ? f2fs_fill_super+0x9b20/0x9b20 [ 325.079827][T13658] ? f2fs_fill_super+0x3001/0x9b20 [ 325.084940][T13658] ? f2fs_kmalloc+0x1b/0x30 [ 325.089459][T13658] should_failslab+0x5/0x20 [ 325.093941][T13658] __kmalloc+0x5f/0x2d0 [ 325.098076][T13658] f2fs_kmalloc+0x1b/0x30 [ 325.102382][T13658] f2fs_fill_super+0x3a46/0x9b20 [ 325.107296][T13658] ? snprintf+0xd6/0x120 [ 325.111507][T13658] ? up_read+0x10/0x10 [ 325.115545][T13658] ? kill_f2fs_super+0x330/0x330 [ 325.120465][T13658] ? mount_bdev+0x340/0x340 [ 325.124938][T13658] mount_bdev+0x22d/0x340 [ 325.129239][T13658] ? kill_f2fs_super+0x330/0x330 [ 325.134146][T13658] legacy_get_tree+0xde/0x170 [ 325.138808][T13658] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 325.144871][T13658] vfs_get_tree+0x85/0x260 [ 325.149259][T13658] do_mount+0x18ab/0x2660 [ 325.153558][T13658] ? copy_mount_string+0x30/0x30 [ 325.158464][T13658] ? copy_mount_options+0x1f8/0x320 [ 325.163632][T13658] ? copy_mount_options+0x230/0x320 [ 325.168800][T13658] ? __sanitizer_cov_trace_pc+0x35/0x50 [ 325.174313][T13658] ? copy_mount_options+0x293/0x320 [ 325.179479][T13658] ksys_mount+0xc2/0xf0 [ 325.183607][T13658] __x64_sys_mount+0xb1/0xc0 [ 325.188166][T13658] do_syscall_64+0xcb/0x150 [ 325.192639][T13658] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.198500][T13658] RIP: 0033:0x460c6a [ 325.202365][T13658] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 03:01:02 executing program 0 (fault-call:2 fault-nth:63): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:02 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xfeffffff}, 0x0) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x3f000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x14}}, 0x14}}, 0x0) 03:01:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = fsmount(r1, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001480)='/dev/full\x00', 0x8800, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000014c0)='tmpfs\x00', &(0x7f0000001500)='./file0\x00', 0xfffffffffffffff8, 0x2, &(0x7f0000001600)=[{&(0x7f0000001540)="850e304acbe1dbe5445c1b5289426859", 0x10, 0x1}, {&(0x7f00000015c0)="fda8999dd547f088bb7448923c5232d87dabb4b6875c5d14986bcf47d3dd265c43d74a941c1437cb9c11097b282c64e70e982be4b450ccfb77b8bcfd905756", 0x3f, 0x3}], 0x2001020, &(0x7f0000001640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x25, 0x38]}}, {@huge_within_size='huge=within_size'}, {@size={'size', 0x3d, [0x70, 0x31, 0x38, 0x67]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x78, 0x70, 0x32, 0x67, 0x25, 0x37, 0x6b, 0x38]}}], [{@fowner_lt={'fowner<'}}, {@dont_hash='dont_hash'}, {@hash='hash'}, {@euid_gt={'euid>', 0xee00}}]}) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) r10 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001880)='/dev/vcsa\x00', 0x181080, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$unix(r1, &(0x7f0000001980)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000001340)=[{&(0x7f0000000140)="b472fb93edbe560064915973a04f517508cfda4932ffa695f93c92f5826e7bc90df6de07e1f7378413617f8b13ddecbfc810c1a8512ee4f61a86d9f7a829f95b7333583a61fc001ce5ac49b40f6f9a191b5f53b3c90e", 0x56}, {&(0x7f0000000080)="5b581b0fc70700000000000000f2d39f5122a6e2508f1739", 0x18}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="e21e35bacc38cf49a4c58885d0f1e4211ad9185d339bb0e03805e10e5b9eceb9076b459303baa7df80708c9a30c334b32c6b7f6e69e2d37788b4afb50d0fc2f875d07f01afb9043b528873d34917a73af48b7763aa04f835b22d6b2f3b32d2b5d68b34ee0744bf967c58b35f1ce61cc47f5f948e38db51aef447f6a1eb34202180011f4f2409af6414b13465", 0x8c}, {&(0x7f0000001280)="ce3d06cfb440eb39838f7a515480c58f442598f798b539cbbc46eb9b4f76418eafb0c3782bdf41fb8deff595e3ae4de9d9b5e8e20e93f20c01a54c0fb816934f6fda1068eb064d6ecb79dc7a56c106b02772bd0fa9df59765a193063801cfe32c47c1a05357daa83d1d5849f586ed17d0d67fc01845a72fb4f72467ed4c51cb69f32db856d78b468106cc521685205c014f7ff12dedcd7c0c98362b2d4dd0697489c91257859babb28a6b1411a4dddf99a83671bceba4a5cd645c5dc08f8de", 0xbf}], 0x5, &(0x7f00000018c0)=[@rights={{0x2c, 0x1, 0x1, [r2, r1, r0, r1, r0, 0xffffffffffffffff, r1]}}, @rights={{0x2c, 0x1, 0x1, [r1, r1, r3, r1, r4, r5, r6]}}, @rights={{0x1c, 0x1, 0x1, [r7, r2, r8]}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x20, 0x1, 0x1, [r10, r11, r2, r1]}}], 0xb8, 0x24048800}, 0x10001) [ 325.221955][T13658] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 325.230333][T13658] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 325.238272][T13658] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 325.246215][T13658] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 325.254156][T13658] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 325.262113][T13658] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x40000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x30}}, 0x14}}, 0x0) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:01:02 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x4120439c, @loopback={0x0, 0xac141409}}, 0x1c) [ 325.319998][T13699] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 325.330987][T13699] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 325.348579][T13699] FAULT_INJECTION: forcing a failure. [ 325.348579][T13699] name failslab, interval 1, probability 0, space 0, times 0 [ 325.369789][T13699] CPU: 0 PID: 13699 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 325.379987][T13699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.390037][T13699] Call Trace: [ 325.393330][T13699] dump_stack+0x1dd/0x24e [ 325.397657][T13699] ? devkmsg_release+0x11c/0x11c [ 325.402595][T13699] ? show_regs_print_info+0x12/0x12 [ 325.407794][T13699] should_fail+0x6fb/0x860 [ 325.412201][T13699] ? setup_fault_attr+0x3d0/0x3d0 [ 325.417201][T13699] ? f2fs_kmalloc+0x1b/0x30 [ 325.421677][T13699] should_failslab+0x5/0x20 [ 325.426153][T13699] __kmalloc+0x5f/0x2d0 [ 325.430301][T13699] ? f2fs_kmalloc+0x1b/0x30 [ 325.434811][T13699] f2fs_kmalloc+0x1b/0x30 [ 325.439127][T13699] f2fs_fill_super+0x45be/0x9b20 [ 325.444055][T13699] ? snprintf+0xd6/0x120 [ 325.448281][T13699] ? up_read+0x10/0x10 [ 325.452336][T13699] ? kill_f2fs_super+0x330/0x330 [ 325.457247][T13699] ? mount_bdev+0x340/0x340 [ 325.461723][T13699] mount_bdev+0x22d/0x340 [ 325.466025][T13699] ? kill_f2fs_super+0x330/0x330 [ 325.470935][T13699] legacy_get_tree+0xde/0x170 [ 325.475628][T13699] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 325.481668][T13699] vfs_get_tree+0x85/0x260 [ 325.486058][T13699] do_mount+0x18ab/0x2660 [ 325.490361][T13699] ? copy_mount_string+0x30/0x30 [ 325.495271][T13699] ? copy_mount_options+0x59/0x320 [ 325.500355][T13699] ? copy_mount_options+0x293/0x320 [ 325.505525][T13699] ksys_mount+0xc2/0xf0 [ 325.509652][T13699] __x64_sys_mount+0xb1/0xc0 [ 325.514262][T13699] do_syscall_64+0xcb/0x150 [ 325.518741][T13699] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.524608][T13699] RIP: 0033:0x460c6a [ 325.528477][T13699] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 325.548053][T13699] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 325.556450][T13699] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a 03:01:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x60}}, 0x14}}, 0x0) [ 325.564393][T13699] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 325.572335][T13699] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 325.580286][T13699] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 325.588232][T13699] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:02 executing program 0 (fault-call:2 fault-nth:64): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:02 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xfffffffd}, 0x0) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 03:01:02 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x60000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:02 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 325.661682][T13728] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 325.674524][T13728] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 325.693519][T13728] FAULT_INJECTION: forcing a failure. [ 325.693519][T13728] name failslab, interval 1, probability 0, space 0, times 0 [ 325.708095][T13728] CPU: 1 PID: 13728 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 325.718265][T13728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.728310][T13728] Call Trace: [ 325.731581][T13728] dump_stack+0x1dd/0x24e [ 325.735895][T13728] ? devkmsg_release+0x11c/0x11c [ 325.740841][T13728] ? show_regs_print_info+0x12/0x12 [ 325.746012][T13728] should_fail+0x6fb/0x860 [ 325.750412][T13728] ? setup_fault_attr+0x3d0/0x3d0 [ 325.755496][T13728] ? f2fs_kmalloc+0x1b/0x30 [ 325.755510][T13728] should_failslab+0x5/0x20 [ 325.764766][T13728] __kmalloc+0x5f/0x2d0 [ 325.768901][T13728] ? f2fs_kmalloc+0x1b/0x30 [ 325.773378][T13728] f2fs_kmalloc+0x1b/0x30 [ 325.777683][T13728] f2fs_fill_super+0x45be/0x9b20 [ 325.782603][T13728] ? snprintf+0xd6/0x120 [ 325.786818][T13728] ? up_read+0x10/0x10 [ 325.790875][T13728] ? kill_f2fs_super+0x330/0x330 [ 325.795781][T13728] ? mount_bdev+0x340/0x340 [ 325.800257][T13728] mount_bdev+0x22d/0x340 [ 325.804563][T13728] ? kill_f2fs_super+0x330/0x330 [ 325.809473][T13728] legacy_get_tree+0xde/0x170 [ 325.814133][T13728] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 325.820204][T13728] vfs_get_tree+0x85/0x260 [ 325.824598][T13728] do_mount+0x18ab/0x2660 [ 325.828903][T13728] ? copy_mount_string+0x30/0x30 [ 325.833812][T13728] ? copy_mount_options+0x1f8/0x320 [ 325.838997][T13728] ? __sanitizer_cov_trace_const_cmp4+0x22/0x90 [ 325.845210][T13728] ? copy_mount_options+0x293/0x320 [ 325.850379][T13728] ksys_mount+0xc2/0xf0 [ 325.854505][T13728] __x64_sys_mount+0xb1/0xc0 [ 325.859082][T13728] do_syscall_64+0xcb/0x150 [ 325.863558][T13728] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.869422][T13728] RIP: 0033:0x460c6a [ 325.873287][T13728] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 325.892867][T13728] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 325.901269][T13728] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 325.909227][T13728] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 325.917172][T13728] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 325.925123][T13728] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 325.933066][T13728] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xffffffffcc3bd10b) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@huge_never='huge=never'}]}) 03:01:03 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0xfffffffe}, 0x0) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x78000000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0xe0}}, 0x14}}, 0x0) 03:01:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:01:03 executing program 0 (fault-call:2 fault-nth:65): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x7ffff000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x1f4}}, 0x14}}, 0x0) 03:01:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 326.150098][T13753] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.171596][T13753] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 326.182833][T13753] FAULT_INJECTION: forcing a failure. [ 326.182833][T13753] name failslab, interval 1, probability 0, space 0, times 0 03:01:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 03:01:03 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x4000000000000}, 0x0) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x8dffffff, @loopback={0x0, 0xac141409}}, 0x1c) [ 326.213724][T13753] CPU: 0 PID: 13753 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 326.223900][T13753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.233949][T13753] Call Trace: [ 326.237237][T13753] dump_stack+0x1dd/0x24e [ 326.241566][T13753] ? devkmsg_release+0x11c/0x11c [ 326.246504][T13753] ? show_regs_print_info+0x12/0x12 [ 326.251702][T13753] should_fail+0x6fb/0x860 [ 326.256116][T13753] ? setup_fault_attr+0x3d0/0x3d0 [ 326.261138][T13753] ? f2fs_kmalloc+0x1b/0x30 [ 326.265630][T13753] should_failslab+0x5/0x20 [ 326.270204][T13753] __kmalloc+0x5f/0x2d0 [ 326.274334][T13753] ? f2fs_kmalloc+0x1b/0x30 [ 326.278811][T13753] f2fs_kmalloc+0x1b/0x30 [ 326.283113][T13753] f2fs_fill_super+0x45be/0x9b20 [ 326.288027][T13753] ? snprintf+0xd6/0x120 [ 326.292241][T13753] ? up_read+0x10/0x10 [ 326.296284][T13753] ? kill_f2fs_super+0x330/0x330 [ 326.301237][T13753] ? mount_bdev+0x340/0x340 [ 326.305711][T13753] mount_bdev+0x22d/0x340 [ 326.310015][T13753] ? kill_f2fs_super+0x330/0x330 [ 326.314925][T13753] legacy_get_tree+0xde/0x170 [ 326.319571][T13753] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 326.325605][T13753] vfs_get_tree+0x85/0x260 [ 326.329992][T13753] do_mount+0x18ab/0x2660 [ 326.334293][T13753] ? copy_mount_string+0x30/0x30 [ 326.339203][T13753] ? copy_mount_options+0x59/0x320 [ 326.344288][T13753] ? copy_mount_options+0x293/0x320 [ 326.349460][T13753] ksys_mount+0xc2/0xf0 [ 326.353604][T13753] __x64_sys_mount+0xb1/0xc0 [ 326.358181][T13753] do_syscall_64+0xcb/0x150 [ 326.362656][T13753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.368518][T13753] RIP: 0033:0x460c6a [ 326.372433][T13753] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 326.392007][T13753] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 326.400393][T13753] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a 03:01:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x300}}, 0x14}}, 0x0) 03:01:03 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x9c432041, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:03 executing program 0 (fault-call:2 fault-nth:66): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) [ 326.408343][T13753] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 326.416323][T13753] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 326.424270][T13753] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 326.432224][T13753] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x3e8}}, 0x14}}, 0x0) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa0050000, @loopback={0x0, 0xac141409}}, 0x1c) 03:01:03 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) 03:01:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 326.525444][T13800] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.543945][T13800] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 326.567756][T13800] FAULT_INJECTION: forcing a failure. 03:01:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/12]) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@netrom, @netrom, @bcast, @bcast, @null, @default, @remote, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000000440)=""/57, 0x39}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f00000002c0)=""/162, 0xa2}, {0x0}, {0x0}], 0x3}}], 0x3, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private1}}, &(0x7f00000002c0)=0xe8) r5 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r6) r7 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r8) r9 = getuid() ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000300)=0x0) r11 = getgid() setregid(0xee00, r11) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x4}, [{0x2, 0x0, r3}, {0x2, 0x5, r4}, {0x2, 0x2, r6}, {0x2, 0x4, r8}, {0x2, 0x0, 0xee00}, {0x2, 0x2, r9}, {0x2, 0x0, 0xee00}, {0x2, 0x0, r10}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x5}], {0x4, 0x2}, [{0x8, 0x5}, {0x8, 0x1, r11}, {0x8, 0x4, 0xee00}, {0x8, 0x1, r12}], {0x10, 0x6}, {0x20, 0xd}}, 0x94, 0x2) 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x500}}, 0x14}}, 0x0) 03:01:03 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) 03:01:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0x600}}, 0x14}}, 0x0) 03:01:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xc8050000, @loopback={0x0, 0xac141409}}, 0x1c) [ 326.567756][T13800] name failslab, interval 1, probability 0, space 0, times 0 [ 326.617347][T13800] CPU: 1 PID: 13800 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 326.627523][T13800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.637585][T13800] Call Trace: [ 326.640872][T13800] dump_stack+0x1dd/0x24e [ 326.645220][T13800] ? devkmsg_release+0x11c/0x11c [ 326.650151][T13800] ? show_regs_print_info+0x12/0x12 [ 326.655343][T13800] ? kmem_cache_alloc+0x1e0/0x270 [ 326.660365][T13800] ? kmem_cache_create_usercopy+0x145/0x1d0 03:01:03 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xe0ffffff, @loopback={0x0, 0xac141409}}, 0x1c) [ 326.666254][T13800] ? kmem_cache_create+0xf/0x20 [ 326.671105][T13800] ? f2fs_init_xattr_caches+0x156/0x230 [ 326.676634][T13800] ? mount_bdev+0x22d/0x340 [ 326.681115][T13800] ? legacy_get_tree+0xde/0x170 [ 326.686058][T13800] ? vfs_get_tree+0x85/0x260 [ 326.690622][T13800] ? do_mount+0x18ab/0x2660 [ 326.695096][T13800] should_fail+0x6fb/0x860 [ 326.699491][T13800] ? setup_fault_attr+0x3d0/0x3d0 [ 326.704486][T13800] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 326.709918][T13800] ? cache_random_seq_create+0x7f/0x1c0 [ 326.715446][T13800] should_failslab+0x5/0x20 [ 326.719933][T13800] __kmalloc+0x5f/0x2d0 [ 326.724070][T13800] cache_random_seq_create+0x7f/0x1c0 [ 326.729425][T13800] __kmem_cache_create+0x497/0x6f0 [ 326.734509][T13800] ? create_cache+0x3b/0x1f0 [ 326.739070][T13800] ? kmem_cache_alloc+0x1e0/0x270 [ 326.744066][T13800] create_cache+0x156/0x1f0 [ 326.748542][T13800] kmem_cache_create_usercopy+0x145/0x1d0 [ 326.754254][T13800] kmem_cache_create+0xf/0x20 [ 326.758905][T13800] f2fs_init_xattr_caches+0x156/0x230 [ 326.764246][T13800] ? __f2fs_setxattr+0x1940/0x1940 [ 326.769333][T13800] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 326.775117][T13800] ? __percpu_counter_init+0x1aa/0x1e0 [ 326.780547][T13800] f2fs_fill_super+0x57ba/0x9b20 [ 326.785464][T13800] ? snprintf+0xd6/0x120 [ 326.789678][T13800] ? kill_f2fs_super+0x330/0x330 [ 326.794585][T13800] ? mount_bdev+0x340/0x340 [ 326.799060][T13800] mount_bdev+0x22d/0x340 [ 326.803362][T13800] ? kill_f2fs_super+0x330/0x330 [ 326.808273][T13800] legacy_get_tree+0xde/0x170 [ 326.812923][T13800] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 326.818959][T13800] vfs_get_tree+0x85/0x260 [ 326.823350][T13800] do_mount+0x18ab/0x2660 [ 326.827667][T13800] ? copy_mount_string+0x30/0x30 [ 326.832578][T13800] ? copy_mount_options+0x59/0x320 [ 326.837660][T13800] ? copy_mount_options+0x293/0x320 [ 326.842831][T13800] ksys_mount+0xc2/0xf0 [ 326.846959][T13800] __x64_sys_mount+0xb1/0xc0 [ 326.851519][T13800] do_syscall_64+0xcb/0x150 [ 326.855994][T13800] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.861858][T13800] RIP: 0033:0x460c6a [ 326.865728][T13800] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 326.885306][T13800] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 326.893688][T13800] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 326.901630][T13800] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 326.909571][T13800] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 326.917511][T13800] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 326.925450][T13800] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 326.941574][T13800] SLUB: Unable to initialize free list for f2fs_xattr_entry-7:0 [ 326.955944][T13800] kmem_cache_create(f2fs_xattr_entry-7:0) failed with error -22 [ 326.969871][T13800] CPU: 1 PID: 13800 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 326.980170][T13800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.990212][T13800] Call Trace: [ 326.993481][T13800] dump_stack+0x1dd/0x24e [ 326.997780][T13800] ? devkmsg_release+0x11c/0x11c [ 327.002686][T13800] ? show_regs_print_info+0x12/0x12 [ 327.007857][T13800] kmem_cache_create_usercopy+0x8c/0x1d0 [ 327.013459][T13800] kmem_cache_create+0xf/0x20 [ 327.018104][T13800] f2fs_init_xattr_caches+0x156/0x230 [ 327.023446][T13800] ? __f2fs_setxattr+0x1940/0x1940 [ 327.028529][T13800] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 327.034305][T13800] ? __percpu_counter_init+0x1aa/0x1e0 [ 327.039756][T13800] f2fs_fill_super+0x57ba/0x9b20 [ 327.044674][T13800] ? snprintf+0xd6/0x120 [ 327.048887][T13800] ? kill_f2fs_super+0x330/0x330 [ 327.053797][T13800] ? mount_bdev+0x340/0x340 [ 327.058269][T13800] mount_bdev+0x22d/0x340 [ 327.062570][T13800] ? kill_f2fs_super+0x330/0x330 [ 327.067480][T13800] legacy_get_tree+0xde/0x170 [ 327.072129][T13800] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 327.078167][T13800] vfs_get_tree+0x85/0x260 [ 327.082566][T13800] do_mount+0x18ab/0x2660 [ 327.086884][T13800] ? copy_mount_string+0x30/0x30 [ 327.091805][T13800] ? copy_mount_options+0x59/0x320 [ 327.096892][T13800] ? copy_mount_options+0x293/0x320 [ 327.102060][T13800] ksys_mount+0xc2/0xf0 [ 327.106189][T13800] __x64_sys_mount+0xb1/0xc0 [ 327.110749][T13800] do_syscall_64+0xcb/0x150 [ 327.115225][T13800] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.121093][T13800] RIP: 0033:0x460c6a [ 327.124958][T13800] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.144552][T13800] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 327.152931][T13800] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 327.160875][T13800] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 03:01:04 executing program 0 (fault-call:2 fault-nth:67): pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x2011e0}], 0x0, &(0x7f0000000080)={[{@whint_mode_user='whint_mode=user-based'}]}) 03:01:04 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3300, 0xffffff7f, {0x0, 0x0, 0xa00}}, 0x14}}, 0x0) 03:01:04 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x2, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 03:01:04 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1245, 0x2, 0x6, 0x0, 0x3200, 0xffffff7f}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) 03:01:04 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xeffdffff, @loopback={0x0, 0xac141409}}, 0x1c) [ 327.168817][T13800] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 327.176760][T13800] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 327.184701][T13800] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 327.234900][T13850] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 327.255318][T13850] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 327.264834][T13850] FAULT_INJECTION: forcing a failure. [ 327.264834][T13850] name failslab, interval 1, probability 0, space 0, times 0 [ 327.278673][T13850] CPU: 1 PID: 13850 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 327.288834][T13850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.298886][T13850] Call Trace: [ 327.302168][T13850] dump_stack+0x1dd/0x24e [ 327.306517][T13850] ? devkmsg_release+0x11c/0x11c [ 327.311484][T13850] ? show_regs_print_info+0x12/0x12 [ 327.316656][T13850] should_fail+0x6fb/0x860 [ 327.321055][T13850] ? setup_fault_attr+0x3d0/0x3d0 [ 327.326057][T13850] ? __kernfs_new_node+0xdb/0x6e0 [ 327.331071][T13850] should_failslab+0x5/0x20 [ 327.335546][T13850] kmem_cache_alloc+0x36/0x270 [ 327.340303][T13850] ? memcpy+0x38/0x50 [ 327.344276][T13850] __kernfs_new_node+0xdb/0x6e0 [ 327.349115][T13850] ? kobject_init_and_add+0xda/0x190 [ 327.354369][T13850] ? sysfs_slab_add+0x193/0x310 [ 327.359189][T13850] ? f2fs_init_xattr_caches+0x156/0x230 [ 327.364705][T13850] ? f2fs_fill_super+0x57ba/0x9b20 [ 327.369791][T13850] ? kernfs_new_node+0x160/0x160 [ 327.374701][T13850] ? do_mount+0x18ab/0x2660 [ 327.379180][T13850] ? ksys_mount+0xc2/0xf0 [ 327.383482][T13850] ? __x64_sys_mount+0xb1/0xc0 [ 327.388215][T13850] ? do_syscall_64+0xcb/0x150 [ 327.392861][T13850] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.398914][T13850] kernfs_create_dir_ns+0x90/0x220 [ 327.403996][T13850] sysfs_create_dir_ns+0x181/0x3a0 [ 327.409076][T13850] ? sysfs_warn_dup+0xb0/0xb0 [ 327.413727][T13850] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 327.419763][T13850] ? kobject_set_name_vargs+0x5d/0x110 [ 327.425229][T13850] kobject_add_internal+0x55f/0xb50 [ 327.430409][T13850] kobject_init_and_add+0x122/0x190 [ 327.435588][T13850] ? kobject_add+0x230/0x230 [ 327.440151][T13850] ? kernfs_find_ns+0x3db/0x440 [ 327.444974][T13850] ? mutex_unlock+0x19/0x40 [ 327.449449][T13850] sysfs_slab_add+0x193/0x310 [ 327.454097][T13850] __kmem_cache_create+0x67c/0x6f0 [ 327.459194][T13850] ? create_cache+0x3b/0x1f0 [ 327.463762][T13850] ? kmem_cache_alloc+0x1e0/0x270 [ 327.468756][T13850] create_cache+0x156/0x1f0 [ 327.473228][T13850] kmem_cache_create_usercopy+0x145/0x1d0 [ 327.478939][T13850] kmem_cache_create+0xf/0x20 [ 327.483591][T13850] f2fs_init_xattr_caches+0x156/0x230 [ 327.488955][T13850] ? __f2fs_setxattr+0x1940/0x1940 [ 327.494041][T13850] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 327.499829][T13850] ? __percpu_counter_init+0x1aa/0x1e0 [ 327.505259][T13850] f2fs_fill_super+0x57ba/0x9b20 [ 327.510183][T13850] ? snprintf+0xd6/0x120 [ 327.514401][T13850] ? kill_f2fs_super+0x330/0x330 [ 327.519308][T13850] ? mount_bdev+0x340/0x340 [ 327.523782][T13850] mount_bdev+0x22d/0x340 [ 327.528082][T13850] ? kill_f2fs_super+0x330/0x330 [ 327.532991][T13850] legacy_get_tree+0xde/0x170 [ 327.537639][T13850] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 327.543674][T13850] vfs_get_tree+0x85/0x260 [ 327.548063][T13850] do_mount+0x18ab/0x2660 [ 327.552363][T13850] ? copy_mount_string+0x30/0x30 [ 327.557273][T13850] ? copy_mount_options+0x59/0x320 [ 327.562355][T13850] ? copy_mount_options+0x293/0x320 [ 327.567526][T13850] ksys_mount+0xc2/0xf0 [ 327.571673][T13850] __x64_sys_mount+0xb1/0xc0 [ 327.576233][T13850] do_syscall_64+0xcb/0x150 [ 327.580712][T13850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.586580][T13850] RIP: 0033:0x460c6a [ 327.590450][T13850] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.610041][T13850] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 327.618424][T13850] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 327.626384][T13850] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 327.634336][T13850] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 327.642280][T13850] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 327.650234][T13850] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 327.666501][T13850] kobject_add_internal failed for f2fs_xattr_entry-7:0 (error: -12 parent: slab) [ 327.675780][T13850] kasan: CONFIG_KASAN_INLINE enabled [ 327.681055][T13850] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 327.689091][T13850] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 327.696011][T13850] CPU: 1 PID: 13850 Comm: syz-executor.0 Not tainted 5.4.88-syzkaller-00116-gc9951e5d80dd #0 [ 327.706137][T13850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.716190][T13850] RIP: 0010:free_percpu+0x265/0x900 [ 327.721354][T13850] Code: 3c 30 00 48 8b 2c 24 74 08 48 89 df e8 84 c1 0b 00 48 8b 3b 48 01 ef e8 d9 a1 06 00 48 89 c3 48 83 c3 20 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 5c c1 0b 00 4c 8b 23 4d 8d 7c 24 [ 327.740924][T13850] RSP: 0018:ffff8881e513f6c0 EFLAGS: 00010002 [ 327.746955][T13850] RAX: 0000000000000004 RBX: 0000000000000020 RCX: 0000000000040000 [ 327.754895][T13850] RDX: ffffc90001cfd000 RSI: 000000000003ffff RDI: 0000000000040000 [ 327.762835][T13850] RBP: ffff1103da44c600 R08: ffffffff818e6986 R09: 0000000000000003 [ 327.770775][T13850] R10: ffffed103ca27ec5 R11: 0000000000000004 R12: ffff88823feaf7c0 [ 327.778713][T13850] R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000246 [ 327.786655][T13850] FS: 00007f4b3a1fa700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 327.795550][T13850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 327.802114][T13850] CR2: 00007f2183f76000 CR3: 00000001afed0000 CR4: 00000000001406e0 [ 327.810055][T13850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 327.817995][T13850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 327.825949][T13850] Call Trace: [ 327.829215][T13850] __kmem_cache_create+0x693/0x6f0 [ 327.834309][T13850] ? create_cache+0x3b/0x1f0 [ 327.838877][T13850] ? kmem_cache_alloc+0x1e0/0x270 [ 327.843869][T13850] create_cache+0x156/0x1f0 [ 327.848338][T13850] kmem_cache_create_usercopy+0x145/0x1d0 [ 327.854111][T13850] kmem_cache_create+0xf/0x20 [ 327.858756][T13850] f2fs_init_xattr_caches+0x156/0x230 [ 327.864098][T13850] ? __f2fs_setxattr+0x1940/0x1940 [ 327.869181][T13850] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 327.874954][T13850] ? __percpu_counter_init+0x1aa/0x1e0 [ 327.880380][T13850] f2fs_fill_super+0x57ba/0x9b20 [ 327.885290][T13850] ? snprintf+0xd6/0x120 [ 327.889502][T13850] ? kill_f2fs_super+0x330/0x330 [ 327.894406][T13850] ? mount_bdev+0x340/0x340 [ 327.898875][T13850] mount_bdev+0x22d/0x340 [ 327.903179][T13850] ? kill_f2fs_super+0x330/0x330 [ 327.908097][T13850] legacy_get_tree+0xde/0x170 [ 327.912750][T13850] ? trace_raw_output_f2fs_fiemap+0x210/0x210 [ 327.918807][T13850] vfs_get_tree+0x85/0x260 [ 327.923211][T13850] do_mount+0x18ab/0x2660 [ 327.927518][T13850] ? copy_mount_string+0x30/0x30 [ 327.932429][T13850] ? copy_mount_options+0x59/0x320 [ 327.937511][T13850] ? copy_mount_options+0x293/0x320 [ 327.942677][T13850] ksys_mount+0xc2/0xf0 [ 327.946801][T13850] __x64_sys_mount+0xb1/0xc0 [ 327.951358][T13850] do_syscall_64+0xcb/0x150 [ 327.955846][T13850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.961703][T13850] RIP: 0033:0x460c6a [ 327.965565][T13850] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 327.985169][T13850] RSP: 002b:00007f4b3a1f9a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 327.993545][T13850] RAX: ffffffffffffffda RBX: 00007f4b3a1f9b10 RCX: 0000000000460c6a [ 328.001485][T13850] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b3a1f9ad0 [ 328.009437][T13850] RBP: 00007f4b3a1f9ad0 R08: 00007f4b3a1f9b10 R09: 0000000020000000 [ 328.017376][T13850] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 328.025315][T13850] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 328.033256][T13850] Modules linked in: [ 328.037120][T13850] ---[ end trace d2b3b97dcbdd4dfb ]--- [ 328.042552][T13850] RIP: 0010:free_percpu+0x265/0x900 [ 328.047716][T13850] Code: 3c 30 00 48 8b 2c 24 74 08 48 89 df e8 84 c1 0b 00 48 8b 3b 48 01 ef e8 d9 a1 06 00 48 89 c3 48 83 c3 20 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 5c c1 0b 00 4c 8b 23 4d 8d 7c 24 [ 328.067287][T13850] RSP: 0018:ffff8881e513f6c0 EFLAGS: 00010002 [ 328.073316][T13850] RAX: 0000000000000004 RBX: 0000000000000020 RCX: 0000000000040000 [ 328.081256][T13850] RDX: ffffc90001cfd000 RSI: 000000000003ffff RDI: 0000000000040000 [ 328.089233][T13850] RBP: ffff1103da44c600 R08: ffffffff818e6986 R09: 0000000000000003 [ 328.097181][T13850] R10: ffffed103ca27ec5 R11: 0000000000000004 R12: ffff88823feaf7c0 [ 328.105125][T13850] R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000246 [ 328.113068][T13850] FS: 00007f4b3a1fa700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 328.121963][T13850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 328.128513][T13850] CR2: 00007f2183f76000 CR3: 00000001afed0000 CR4: 00000000001406e0 [ 328.136453][T13850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 328.144391][T13850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 328.152330][T13850] Kernel panic - not syncing: Fatal exception [ 329.240071][T13850] Shutting down cpus with NMI [ 329.245444][T13850] Kernel Offset: disabled [ 329.249751][T13850] Rebooting in 86400 seconds..