=ANY=[]) 08:54:31 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1623.012215] EXT4-fs error (device loop4): ext4_quota_enable:5838: comm syz-executor.4: Bad quota inode # 3 [ 1623.027579] EXT4-fs error (device loop0): ext4_quota_enable:5838: comm syz-executor.0: Bad quota inode # 3 [ 1623.038410] EXT4-fs warning (device loop4): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1623.047638] EXT4-fs warning (device loop0): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1623.053058] EXT4-fs (loop4): mount failed [ 1623.078223] EXT4-fs (loop0): mount failed 08:54:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:34 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f0000000080)={0x0, 0x1}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) 08:54:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/52, 0x34, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:34 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{&(0x7f0000000080)=@ll={0x11, 0xf7, r4, 0x1, 0x4, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x33}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000100)="e592305f2592de3fb20c315d37790f1544e027abae4449581d767b2ba92481697e6001137c5f62b806384998158239f2906f6e02692886753068b5eed79bd2c1d4ed59aab32dd4f8e5a3cd8cd25f0a2ec63e2de210e737b3a9e8a15d159442d0c58bcac1c1b251157c8be5ee5f5ad1853909582ff0b3e302ca24", 0x7a}], 0x2}}], 0x1, 0x4000890) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x0, 0x4800}}) [ 1625.740623] EXT4-fs error (device loop0): ext4_quota_enable:5838: comm syz-executor.0: Bad quota inode # 3 [ 1625.755464] EXT4-fs warning (device loop0): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1625.780916] EXT4-fs (loop0): mount failed 08:54:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1625.820956] EXT4-fs error (device loop4): ext4_quota_enable:5838: comm syz-executor.4: Bad quota inode # 3 [ 1625.854353] EXT4-fs warning (device loop4): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1625.868250] EXT4-fs (loop4): mount failed [ 1625.869441] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1626.008897] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:35 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1626.065378] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 3 [ 1626.126292] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1626.145457] EXT4-fs error (device loop4): ext4_quota_enable:5838: comm syz-executor.4: Bad quota inode # 3 [ 1626.161785] EXT4-fs warning (device loop4): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1626.177680] EXT4-fs (loop5): mount failed [ 1626.179801] EXT4-fs (loop4): mount failed [ 1626.191164] EXT4-fs error (device loop0): ext4_quota_enable:5838: comm syz-executor.0: Bad quota inode # 3 [ 1626.202090] EXT4-fs warning (device loop0): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1626.216135] EXT4-fs (loop0): mount failed 08:54:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) r4 = getpgid(r3) write$cgroup_pid(r1, &(0x7f0000000140)=r4, 0x12) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r6, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r6, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r5, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r5, r6, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x4b, 0x900, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xf529, 0x7}, 0x40, 0xff, 0x40, 0x4, 0x0, 0x4, 0x3, 0x0, 0x1203, 0x0, 0x4}, r4, 0xffffffffffffffff, r5, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:37 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x0, 0x4c}}) 08:54:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:37 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:37 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x0, 0x3}}) 08:54:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1628.759360] EXT4-fs (loop0): unsupported descriptor size 0 08:54:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 08:54:37 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xff0f, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1628.881265] EXT4-fs error (device loop4): ext4_quota_enable:5838: comm syz-executor.4: Bad quota inode # 3 [ 1628.913603] EXT4-fs warning (device loop4): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:54:37 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x40}, r0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100), 0x224202, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000200)='/dev/snd/timer\x00') r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) ioctl$KDSETMODE(r5, 0x4b3a, 0x1) ioctl$BTRFS_IOC_SCRUB_CANCEL(r4, 0x941c, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000140)=""/140) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r8 = getpgid(0x0) write$cgroup_pid(r7, &(0x7f0000000140)=r8, 0x12) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x20, 0xa9, 0x5, 0x8, 0x0, 0x400, 0x8020, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x2dc5}, 0x100, 0x101, 0xffffe56d, 0x3, 0x1, 0x8001, 0x7716, 0x0, 0xffffffff, 0x0, 0x27d2}, r8, 0x7, r9, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1628.979716] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1629.000584] EXT4-fs (loop4): mount failed 08:54:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1629.048323] EXT4-fs (loop0): unsupported descriptor size 0 [ 1629.215641] EXT4-fs error (device loop4): ext4_quota_enable:5838: comm syz-executor.4: Bad quota inode # 3 [ 1629.226624] EXT4-fs warning (device loop4): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1629.241081] EXT4-fs (loop4): mount failed 08:54:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x4800}}) 08:54:40 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:40 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0x78, 0x2, 0x800}) 08:54:40 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0xc6, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0x10000000, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) close(r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x700}}) [ 1631.775068] EXT4-fs (loop4): unsupported descriptor size 0 08:54:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x600}}) 08:54:40 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1, 0x1, 0xfff, 0x1, 0x8}}) [ 1631.880064] EXT4-fs (loop0): unsupported descriptor size 0 08:54:40 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1631.978829] EXT4-fs (loop4): unsupported descriptor size 0 08:54:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:43 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:43 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x3e7}}) 08:54:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:43 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x1fffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1634.850018] EXT4-fs (loop0): unsupported descriptor size 0 08:54:43 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x400000000000000}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:43 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x7a}}) 08:54:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1634.895839] EXT4-fs (loop4): unsupported descriptor size 0 08:54:43 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:44 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x7}}) [ 1635.128233] EXT4-fs (loop0): unsupported descriptor size 0 [ 1635.138275] EXT4-fs (loop4): unsupported descriptor size 0 08:54:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:46 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x6}}) 08:54:46 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:46 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fchmod(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x3, 0x5, 0x2, 0x0, 0x80000001, 0x738, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5c, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0x4a010, 0x8, 0x7, 0x3, 0x5, 0x45a4, 0x1e1, 0x0, 0xab55, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:46 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32, 0x4}}) 08:54:46 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:46 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x211442) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f0000000780)={{r0}, "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"}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1637.943782] EXT4-fs (loop0): unsupported descriptor size 0 [ 1637.956683] EXT4-fs (loop4): unsupported descriptor size 0 08:54:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:47 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1638.124064] EXT4-fs (loop4): unsupported descriptor size 0 [ 1638.142283] EXT4-fs (loop0): unsupported descriptor size 0 08:54:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:49 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x2, 0x3, 0xcd, 0x0, 0x100000001, 0x0, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x8b}, 0x40, 0x9, 0x6, 0x9, 0x3, 0x6dfe, 0x7, 0x0, 0x7, 0x0, 0x7}, r2, 0xc, r0, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:49 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:49 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x6c000000, 0x3, 0x32}}) 08:54:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:49 executing program 3: perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0xc0a01) r2 = syz_mount_image$adfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x110, 0x8, &(0x7f0000000500)=[{&(0x7f0000000140)="6eb541f2878b52421afa37285c483f4fdb9b77fae021eff2c30a0b75d1493300d79737d4e9972f17357dc2d93bf2dde75d542804e63567d066b20fce78292d0072d9221b649e9e3b0d4ab9e5b6cab4afe4a1d9fa3e7127cc26fbeecdf137799b7160d40a9a2b9104b846b112a69339098d1047017630b68ca5661112b454947fa9a2094a40a551b2549281e7dc1b76913a6d62d51384e8d2e0124cc4e7b9cb43f8eabd6e692032b6f51e6591570bc51179bb33418af447afde2869490eb223", 0xbf, 0x16}, {&(0x7f0000000200)="e9a0e4c877af7a3e5a8e9a29ea29787b4048adf4c18e6ca93e6e069d9b43c40a066401", 0x23, 0x4}, {&(0x7f0000000240)="5aa1322496504f701949b105d2d6d44d012ec7df922d2e10d725affe8d4915a196572f6f56ba82cdfebaeff2cf974019a755a12c5ddc", 0x36, 0x59}, {&(0x7f0000000280)="2075bdf5f2b7e5b1cb12d3242ce28a6492fc3a1c1698942afd3bcb7f226c0fd33db29a11643cdcc4c19071414689d6adc2287e99d00aedd8fe0489386ad25912f5e14a7424ace0ad52a69232f5544b373790ae5423edbdfee7091a54fef3194beca000540098f21755aa4e989fced14aedf5af99a81087323ed8f9fd913afb303cda3be685747e6ff2ba6c8dc8340851", 0x90, 0x5}, {&(0x7f0000000340)="68aad9dea9f49c550a8ccac4ca7b809e5d63d8f0946f6ce47fbf016ce41f731397580c7057681a9fe2ddbc589b2fe5a569c148da8e81d88e8c109f3ef1bafae151fec7d50df2a0ffa116d8fb7a9fd5b1ad5870006c7657681f6935d80a3264e9b277d6de2661589810026c90d7ffa451d2481c19fc35080f0451ae7b0ff806db6818d729b1ffcd9ff34c7c08900e4942bf65", 0x92, 0xeb}, {&(0x7f0000000400)="3a2563a757d7fce9edba8095657124bd08a089c2cef7e473d6d36c6aaaf049c9cbe2a43ce15e702be1840fddb2a060", 0x2f, 0xff}, {&(0x7f0000000440)="814382fe66f26d07059ff23ba53cd03b61184c4fb37224e83321c1743783200bc930772dac5b0546746778892cc421056000c6d2c11998b2465d6d09c4f87abc8e333d7446f713d60a691b2ed431df4bb40b0a01a751e19515f0cdf25325e31df32923ab128aa04b2679cde5dbc3ce529fe554925149c0512933386ad80abb47d6883072f0e1a91b1460b5c3be529220e8afe7b5b1f6b9921f0283aea432606b986d930b9606179f08d49b0aabb6d3d324147a866045", 0xb6, 0x4}, {&(0x7f0000000780)="61892f84d6a1ecf47b44e7223b7753968acf153b0cf77c5c6c5ea97c1e2925d6b6d8df8918d67e187a5e35fd660f6fa7b25a412b3cfbcb6607bfbd9a89edad7044500d679a42449c9a588d7b501d50abd936a4af92d1a3a4081969dbcf0066cd427ca7a222fc769ba381032cae4d3588a9443303d03fa13d4fba991459377e6bb43756541109f9a94606694a2a07ab0294118c2657bf3298142b0b020d452adc2ee354dadc4c9546912ebd01542591fedc1b85641edc4f65dc32aced4c55cd7e3bdf671a5ce4021aed08a752cbd283e499f0cb25867c7cab6de58fe05420222a82b4571ccb3471f825773f759645fd3ed0c3008832ee74c36f3a37ba41736cfead62a5ec091370e59ee49a9a879a5314586f7ccf8377b7c5eff5e3bdd4e9d0c497f7466ca32c60b13477910e65d0a0fbb4dd3a372228d8eaa9525ed94f38588cc1ae90493a404c79e116b8c476f205859af650da078d8fc1a42b67d7be108370c287f9878a57e6d2df2d7c1132a6fc50bafdfc3d07932133a3430bc6fba631a85e7cb19eadc1886b08325fd5f5b7a7a94c38473407b269352129c35d9d9a156283d7938b8c492d3a9db41e47a74a16653d472fa38e4e707d7ab3ef3138d8459dc70d92b2117ae195da43aa35191176d3df3ba639dc767cb4604a75b116c34c4073cc2e3f6b7d9053b6d701bdb586006ddf8ebf59c41d16060d164432c9bc281a31fae7ac9bbd8fc0eae8081d950542be9d93b6383d52d3c20ed11d047392559aeae0a0eec06421d3d94faba77b267bf0ac47defb1e9ae5f3d136fa40b398310c94227045ce283f78f37dee6884050b2bb0d52916aa809f3f5981bc0019c275670ec97a267bf3820a058b4da24f12a60e40d8c2067e07b4533189aa9b3a577cb2289a87151485ac9c91d94171d56b4ee3039fa7ed9a7827902bc5cce8c2a328ecfa59a0e2764b4e048eafa5137bee45ee982887255c30ee35530790ed470e1859e1e4e9519f04e913ff7edf9e7f6d60efe2fb1063f1b3b731507358046c977c2a0b3690b843d520c2bbca94a0b8c2c5e05100f385ff9e16a47ec1d90f03e0622e5134699ba55964a734ca1799575aba0535b75e0688ea236bf296d5547263837e9e05ae131c3f6cc0cab623e8d7f676ee8bb505266a3c108fb86930ffc79e51fea50464aa308f920b6a11ac9085b0d601d095aaa33342ecafb32b382fdcf104b98e56c2322a1b653e24f41b449b6dd7cdd68a99fd9e33b872ffe949218b1fd63e0587446532dfb9e9cac397106bdb53319062d1a93dec7055eef0b391a92df70f9293e9e22de7f209a7e38a43dbc828c3e24a34a770050cf22ff5866324fe5f087591af127d4303cd63d018c394435ed256de22f1e5c1378d570a44db45b016be6b9399be257a1ebf63af494dbb1441c863536a976aad0b41ec7e28323ace2449b8e58b80ce2cd8b3589d08815a19459f7580d7f8ea15d6de5b24fc4f729cf88112c8696f816a80fdaf9dcbef65e93663ba453f8b8998f4cd0a3f673aac2336eabbb9f571a4fb90c667ba27e685c80c318d655d28c84696a021af43754caeca08fbb7414660c302d697bb48cd341fafa24d448eff85fddd741041f88ed6f008c1ae77785962bf0692c1aa90c54807108285e48363ff18d28b20c4034aa89ce7e85300a89fd27c6564d3dd593896b559a8e5bbaa9462cd264b8a63e4a305502f368d5c71b09bf20f127e7d98d576ca0c9fe038972e1a329635560d6b531b11f6876cddf33677915dc967987b1a469394195e138034374c0a4a8530980bf1e4003c220435e1e3b8b29af09292a32180bdbc72400be8b1bd622cbbe88b4f90727226835fd277fcd429d65c3bc37bbdd28bda7c232b5b23389bd07107a13887e114429a4afd8361a95bb0989fdf20fc720388eaaf3ef40fba9f0f8740c92ac6e8f65d65f60002812ceecb6b38499ad007b300bf5abec930842ef46d6d0fbb31b89d4ea7fc58aa3ff2bea72a332acf854ddf9376b39de396724fbffbf2a958639a06b586ea8fb3f392233d9ccc5589fa7e9eb77dfea3dce1be2c188f0b0d36299b6ee7fea7edd4afc80c4a3fa6a77f11dc1d06c1265a0fe454640efbc79f24f44c091227259dca0dd41b60f8ee1dd72e6e4286ea3e873022e8e74cba1b2924473da326ad48f6ae1b2956b12e0f7373d419a8e38657aba6e6f0aae29077f6b6a28088334e2153892bb48bc5fdd3ab1f93ee45c905a650b738346280e0a116082cd391f76d16e150d542f8ff7fba555d4cc8a9789504e167306ceb482ec1d21aee21bcbc6d75300d21e76ef8ac90c224440b876cdd3defeb18580b4af06788bb36c888c6c828ca3f34b181dd92395c74a5681c5793e787e14334c0c8e7926ed6f3bb379b4d6b2541df2738b67922d82f206fcb931be41257fa893245ecdf42a138c5869a6fbe45049fe495c3d3d8d94156d93dbc2c8ca773d28c3d1c8c38357e70199ecb7d3a80bccfeae626b98b8ce72b04ce8ff7aa899de2e05f3b25fc38c5741657968793de59ad884cba291353c0d9a1e588e257dc597c4275e11513b379c30450353ff7074799f602295f294c6c81af20696be64f6dbbc2e9e2d36826c6318976b1a7f8dcc84996fec9195bbb5c9bc0ecef0bee4a199de08c7e3017c646424d04cb7ccae5c520e307dcdac065f39aacde2efc795ee1cb831429e137e05296b7320bcbb0b5ecbf412f6785b3e3458dc2a305e9f384ed78cf81f2e53471e455b9aab6a2906ae88b9fe45968c6b26a48f744214b8c6034fc7e37c0f7434d9e1717cc318a1ce69483e9549d7e357913a9ecc546f42d887688cdd80331e3930afaf427e5b88437e76590336850b607bbcb4fad157f1a1e172e1faae21962e4f08132ba5579865d7c2f051dfb087a86334413ced4952a6fc018d9a0dcc6364a7d5b4888e430d02c8b21888cb488bd92c456e10a115c9907eb9bfd05fef0fe4d41b88ac2488f09b05d41d623e2d0f0405535741061f02e29ffb030e2b9e44380039a3fe79938019d6643f492bb8ea38b9a60ea308b222870ccb5cbc59853d177077423df2c5050028a95574911fc8c577341db8037b11c67ee2121c10f099bbb0f191eba101ccb44592f71ce01ac3a92beacff313fbb84f89b5577e8121a3ae1a18c04b3b2977b9a821c6a76e350b96791aa9f83aa6f7907feed8e33440506f0b0db32b28d6fbe6cbc270aab6b3c8e573872174cbbcc3f657b1b25591bfabe8dfb7602ebfa80a45cfd3f67d52305f192045f4dc5d6398bde5805624b0ada4b1cbef8cbad3d93da2f0ea4ae9d74b49f78a0569904b470d743ff185ea419ecbd3b03def4ad884cdd56d7d68224be897de679468719b9f218a6923ea11248df09b6b56c8c0b97f4ce87d787fdeb0bcd38045aa580c7c9f1145a19a8b8d5a7ce421d4e9eb02070832a7009c3b7f425c2a03df8b7958d4a12a0bdbd4c7f391c7a235389fdb78d27308de4b1841febdb6ac4f857d0060ec5ff67e4e23abcefff197281d40cb1caae09a149187e5d53c3d37f2e7b4d6a33b02bf55c65063093571b300bfe49dcaa4e5a2465c7401cf6b8f8e94c7e737f389c81f3abe48ca8fc919fae72adf21ccdee4c3627f11bff7ec2e1ad29d5f2bb233686e1d9587b7627cc675290aa1b2c7f4ff2202061415a00c93f545ec5aabd11a16b1b50b8dc7db1cf5747aa73947e7ebc38a8bfa98f4cc7f5d0f47807528b092ca36af585f680643d216e6d68ab01dd92405095d6985b9c1bc2653cfbc83a60a0c2638ea0b128d9b14217b560a22d64f89a1ea07ba2356c5d656006732fa9c27c0a8b160b07c8b5e52410e1f58379dd1c53c3fdff946f610a0dba7989fd0d197d565a8c95e266d9cf1eebc89297b79f46c69ccd27d6cc777ea3a40de1bf3d3dedd77a6efee444f5a7944a87a39f2d9683002d7ff2bd4f4290e473a44dd9c9145c6ac21287e8022bff54b4f9659d2d8f5467c64ddb555baaa9cb326c1fac245c897244d17c68031299fcc34fb5daa56dbbb12163f5c2f25a7885cfe43a4a9fd7eec9f91f0df0749f06cf30043af75d4b8060d8d877c288e8ee5eaf801d8ae0394afc9e24dacee967c1b35defef093e858ad1ff6734eccba46a2fb473cdb571d7171e1ea89b39e3657667de2434c67578f47bf272324e4f9c8e51bab70bf9a7e2d5cfde1db8da474e591ba164e568dc310e596162ed8e2c863f620a89277d9c33d035fa553ba0a6b74113c46fe51508a50d4cdd311392cd72a60822456d125e81915b20b576e0ac7345c0c0f3ac92dfadc018478431b6d86ab847d1433f392c77a923beeacc71f66cbcb438fda10466f145e94f7397a6d4dd96c44c0cc96bacf28ebc4ca88797455ac31c4d0679d076d2662abb5d50d9bcc6e5192b3f9d1f0d5698b10e866a26564a76a991cd2d17f4ed32132fc05f2ae72d97ef1cae78b92ff9cc730bbd6420bf19889cd05c723a58cf858123903fda4dab496fdc32e2ab2d740c6caa58e3ab14980bbcbf5e8ff935c1c9373f80e9f539aca5cbc5a3cff2d817e40fccaa4faf001ff4d6fb2d4c8977641b7d8e87ac04a13c1e4e94a8b6707109d5794fe6586df36aa7aecf7335285a2f7320cad0ee973dc27aa64fbf372076a96870da7ee33b6c7eb4bdbd82e89b76561caffb9c58ab4c0ad9a6c7342255545bb84b2e538cf96cbe8ec828c7c6b81749cb6c21be7e3cd30179762ec1faaf1ee4479f76e455fd80a4fb818ddea3810bf2b82b89747f530ec3fd68292fc6b60e64a9e198ba4194cf635b30a1cedecab69056c5300044b968e72fea4ddea6f72c5058f425b6a96155e7814be9824ca549846192c0e713bfca68e5ba09f0089696e141ca53a0f942ece7a80cbe920d8718e9262dd0a01bd6058c1edba0f9a92ed1238bc3574c715e95407cd5cf009b2c3d5877bce8446dd798ee7da35619b82dc3c260baa26956966b63ef7b3e84b2f5f6fcdbd4e183d224125d995b219c28a700724e92c8660ad1fdb42958cb8485ad996a255be30dcd32d8fad06f75c87c8f7e4b26faccb3779ffaa6257a0aac9cff8763b519ae1be1b880ac209952504463ebe77fc5c25c5f25f314153de614d603552b3025d18977237026ac1ec6faf002039d4ed9e100542cc75384bd5bd5c1a564ce7df165c9711afe87aa2c74e0080b4160b415affd713b26249b67e7eee30de9713aa768bc5d7d3fecabcd57b2edf897d840ad3b487e58198e8433c182c17f69fc0bfd27a37ab509d200d34b5bb11addb09a34b43ac671217c35afa8ce119d1b0336ba84b677588b2c30988448b9ca2609cc83794c642cf1208b4effc95310fc4844844ae143a341b4d2ccae202fdf690268862dc52fe7bc1e1a58bab0965e68c9a98d13b15c447ea27feffc9a765dc47d7af10632bdcd51ccd1cb9dc252f4f499c9b58179b818db18f5b922c11c0e095cdc04ff0689d523275af00c88799f935f074a96b0f49ce76ebb65fd1e354dadbd9c0ba4b4c5e4a225e369a1af9667581f4c497539aba136a0fa4bf27d2b16011c1aab44f2c3ddd88d50d3f43b981f540dccd5d32e39453c9f9bca29e29e01f13011b08bbebadd223a6d39acfa34f9ea5003ca21bb9b8c1c16f6ae628739cfe413dda3b869384a196402a2a2292567ab3476ca34f8f42e595166838e4ec53dee73f85c702d18cc3f0d78191bd0ed034e879c8d6a8c0c2f95d7db953e0860e9f13d12972544242f8be9c0915ebca847c88f2f3826489c3574daf9bb5263de6881f38c00da840ff184fa784fef97c7b3b63b3a", 0x1000, 0x4}], 0x804000, &(0x7f00000005c0)={[{'/dev/snd/timer\x00'}, {}, {'){&]+'}, {'/dev/snd/timer\x00'}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x37}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) signalfd4(r2, &(0x7f0000000640)={[0x4d7]}, 0x8, 0x80800) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) syz_mount_image$minix(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x4, 0x5, &(0x7f0000002a40)=[{&(0x7f0000001780)="89f926a223399f8406d3d28f3233532d5951dd82de00e5f32d2256e23a03e12b03ce5934349dfc37963829e4ca76e763e0a0d45184232d9d9e6104436d298337d1c391", 0x43, 0x3}, {&(0x7f0000001800)="4926c7a6331a53f5b94e71715caeaf291b6019ceab57b9ebdbd0cc09c885db8f35d8d5e8e525be190a9d18ff87cae6fc3b3a3b9ff92e018bbc0cec10d786f863c4e472edbabdb1a98aa1896401fa6bb8ae10b751dd9b1eb493fc97a962edbd", 0x5f, 0x9}, {&(0x7f0000002b00)="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", 0xfc, 0x9}, {&(0x7f0000001980)="afcd84acb0745a102940bbca35d352dd5b78522256297192fee37192063a99e0f6fffeb47db045aa92a71fed2ec1b30867a2098c158ccfbc4a8a91fd69fb0c1fef5ae71397cb8795fa92bc2bfc08dbd822860a9bc88802e95472a2d9817f527253117d27a76c41144408faed2e8aee5f76695a15ea15d6ddce0ac118204b629b9f5d6be20666ca48476c7f9ec6f6e5406a1822dfb8d56ffc7f8bf61b5f791ee0e4554d63b3e6ef81d56fe0739055ecc4b9bf529fd05d47236650a72e45c197709de21603a07036a214a901feaf9ceb5b5824c73799ecffc324cd7cd455a210054c9052ee6dcce2080d1c27acbbd6247cb00a6b7940e20594f59f10806f08c8669e8a4cfe501988c42eedea28d70983669ab8960a8840aa33e61125e0884edeeff55bff1c085364abce9ddc9f9392f7a5cc07d784ace074291d7f61dd9ed74b5591cba403f8ce3ae0749b672d1b1e8e09b798bcd5d11a8a3b449632b8a244254bca5becf6fac361a136b6edf3b2d01796c7bfc69d3d19d89f98fcc2e2a77c9f2d8a9bfcf258a685db5fdaeec1acf14b25bcff3efb2e382beafa1dabb80a7634165cef29558d350a0a8f3590aad99d8f5ba6f8f2d47209a22551266baede733e1fef56988583de7bb1638d20e2c95a787111b130aab5699f303a1590854f97d4e63f23291d8d7c6f9ee19ae49ad8308ed7d5fdc981a826d92b3d3e238371dd6daa2fcbd3f5eed41722e8f78b803a5dc7ab97aefd9add10f42fe30299b8bafe2d0b319aba4ae0679a01c75786271d3d174a14472a6bfacdf3584f4287ef3298c056dbde7f5a401b0e6d06839a74ecb7046445e06d94715ce35a1f44ba85d5b2ec3dd73c446d4a2b2ab37bff60688bf42281c31c7d421f6b555f84a748f42e4bb00e96c574434e82c46a47b7e9f0a45b8407d09427127f2763cf65f1d857bcb8113b80a413d5c6b6ce267cb749a8c1e54e579d678bf2dd8f1e5e7c320f12292c0fe26d24209940b31ee72d4c149a39cdd3b588496c839a59bc4abb24a5412e2cf618ce7c93361080b2e69db9b4577b34d83efe6102e2f3fd78ef2ad7b54414f610722c22607d6797a8ae9b1eb1b3d85da2276a816ba45236f87e739025d142d1ce658eadb29e0b13b308d9e4014955a6598630f9d25337e02abece432cdcca2d4364da66359737dcd5017476ee42c6571470604658bf3c45af040d1604097cb51da3ee92debdaefa2112480a6c918e591887f66d46ccaef45e11c4a1e0e9b769e318dcc3398695831723fd6147dc8626f17d156d4a2023c2abe1e9a89588c8efb015d2749820e0ba08d76bcd1ef4754bc2c8d33d79e4f050f112bcaf6febede73119b28a5d85b53f3155156a26c1e341c2d7a233c25db21953b7e4ef2fbc16d8fb5d50853cc42a20351c24a9e551327a51b2180d78c26f3c6aad034871becdb04b342e28b79017fd070724bb828ee2a351b76b1ef6d3860abcfad506cd8f27177d917d0207ef82cee75b0b9373ef2cba43df16bf576808aa44ee1e6a6a50e0298c99aa5a175fcfa67f0c58b3dd040d58051861a4e7ddbd1107133f98fa601f3402443c343b4694546798fb99973e674461b552ec2cbccea22a0414e1c22790bc654a21b0b8273448f525684bc9fd27ceb4f85f072e335389db676684517975467ccc5b95c78a3b3130b264841d8240cc53f6f63f090a7cc414271c2653f4a66289990418abc30f1b036d121d17fbe00f68f53530cc7cf10a9eb5fc5e5e540d934f589c167610e076839a6ecedfd3179adfcbf27897bcec8df09b0dfd01a20a43b5d2562be23e783e62e7654df133a41c07e99bb91a951f365c833934ceabbbf185bedc8bb73786a5f2ea46eaa0065dfacc05dbea85a2493f18a27fb1d5a11b22d2125caaf668e8bb90e1a7d2c1e585b8678afaad3c0a5c4896a9e40ef8f2fa1ecb313ac1214f7566c0a231f04bd2bdc25b6cc6a7d98e7c8dd2db29206ad91036a9ef62058a38d082ab03e9152b17cdea429543f404ef075f06c4699527932b6a328f5e949e660f298a50de55c717d18ab7dd13b35504d0eb363ec8698e9a385d704288d5fdb8059dd65c3189b8e14ebfe97f064be559b86e2cc80ef207ce65c42845b96fb66200092e9c16443be47afe1165c6e7369ad38b586c430457a7c3c8b0b2408a987876f5655c692cf277edcc0c890fd00fd28f69501f96d539de1ad635ba73f93fcfd4518b72ed5ff5b1ed7dc927f19ee96a50da5cd7d976a6b7df58581d8b18aeafc27e5b3d4c6503071b6dd4ea1fd46c66a45369942a19918e96d1ed96b3b23d5307634fbb65669dda954cd536503194a85a326096a9fe8073ea3a53d96fcd975c5d63e8de6e9c0f96935416c0afba6d92e31570ca6e53660c415a83edef5a53d496866b5f78479934ec3083943446725c77173cc9e8d8b5e74bd3cef3124ffae958378431d75fa8f5de9913c22eb592cc5b2fa2ea3ef4b0489db30a0b30bf7219a1ae939513d8ef2e9d1abc874ce7a209ebdc70942167bdb02bf7cb6cfa8d7272cc033ebcf06086977416bea7f24a95143c8a1c8182bc2099d9776510a1bb931fee92d6623caed119ed82cb6bea407530da730688d04bb403453cd6663e68aec9e1d475cba5b949be51be244a9522d49b3db31a683b4d070d4bd13f2b150213e5a4073acee21b4c36ab9eba8950cd475d8a64e789ef331258cc1b0bb2c208691b4e4c1ca7804a05dd6db6402ec3f46fe09b76066890433d2ab86666726aa522564e74f6179d2f39ebc5a9e57e9a2b64b01c2c304f6e70399452b862bd565695e8c238b96dba34ab73a9a73f949bebde77762a12ad514238b82c888975c7b8ee624f07338c00690c7e32e0484dff34af7978a872fd2a3b6c1a98cfaa1a1ceb4db232762c4feae87f8f3ae2d5df204f91425e024106257ffbbef5e459477df0039ab112e74e0a3a9d6f58c3f66c5b86144c8d1a5be555437d36de15c884daa1a3763a080f1dcc0b302e0156a29c4d740281553940b9d0fd610c86027165d52d9b4a90a20f83952dc5f5da585a4ffb25d5a24ef526d0a31bf9660ce1582e828f9c1bae15d6d5e9e5e4ffd59543fd50ac72b9f6aa23f61d2601e436c6d3cb4772a4325ff6b352ce934b59978d508647d60bc7a9b70921312ebecfbcb23f9830d77f6c146be795b60b4bcfe128efb3efebfef01b22ce636c3ba795aefc80ae6232473bdb5f09814961d8cc0d42483830354bd177bfd1a1e066754dd8b6cd38a853084500e408eb44c370594b1b64de618f48c5c96e4015279fcfcb6209d5e82e1b39e97ae2331966ce74d95808a787fc0fbd5fca54fd2543bb823b2263ce262ccda0b6fa21af6fbe44711a519a9d156c7dab8f52ab9d30848abc5b26cdc39d2ac0e7ce8593f6311a5694d62345aa63af6a41d7d5ad23913fb6c69e6c4069fb0a8f45c3352557627f7434e7e9d74c436ef8c0768eb49da7219de8293cacfb8166fe76548d6c76c9b066e453a35a1068ee1b0de2e5795fee9fd5a1972ad7b866885bbbb0cee385eb3d7d64696d773c8f65773509d1fbf5d7c8c86318ebecdab2bb58064d3c38c94ead7119154cee2b44a3d112e3b1e1c899c5868c913274b5b2dd538c99456ed76fd019523af6bd3468630c0324723034765c7e58c311add9ba34f6770bfd83dcfa4ad3127872a29d71d30d92b0148d8f855b9f87a162e17e6f40ea720c66fde0fe8f4f39b51b6bb0cd5bdb47185f6d1ed9aa2b5f0aeafbb5b900b92fdd057ffa87180419f63efbace4ecbb0245d1c69a1cb015158abb7c8c2754b304f3eabcfb2ecbdd251f6163acc4821fdbd2dd910baca6fcab12fdb25c27e4116efa7f9ed16ab351ccea80de4849f66880cb8dce2546c611726b5514c0e69589669e84f4fcf41c65cb7bf08527b38c5efd0aa5f4b4290637e4704ac6a5bf1e0293e31ea8d1debcacc839ad2fea2b5e2e12fdf8602fe774ae554fdc20ba73b6480471d96533962d11e0241f83fafd89e91a35504e90099d8fe90fed36556440e37917905ac5ea82a74d39ec0060c9a533e7932dcbe64836f268c075f351ffa31b496d101e0ed8e7336c94e3aa19aea48bbceacc389fc064049d126be9a45820632147fc6858639c1b84aa264ed91649497ff84c46942127e8cf7bff14e3dbff26a57c2704df01ea25ef6d92620389371112ce47e8e13eea4e184882308ad99223d6d5f48c00caf11717fcad9bc7c8a58fa0c0a51dce56f46fadf3b7437b7209de37055f83003f9d5be895b0ff786f50d7613b4ba8863caae20337bb59813142d1213330fc56349d3a1ece48970a14b7de792297bc4ff27ca5d604e5a9b05029d482a0696e2adf4d5901f9aaed89a98ec42ae9ea3954d36ccea90bfbd7e983584599e819d639cd8702f8578629c5bbdc75ec4a1386318db3e5bf3826c7b21c21ac8023cbf71993ba4f07b5afa137f5d1b5fffa4ed8b8d45f73c59e08995df70231250158a4a770dab73f94cf9f5108652488937731deb4e1f5de955800080e0dc1547c7c2941dff43a61411e9d85b7e892d6ba09b78a3aa171c6514e11d14474a91d79cc28e6708e240433b433fee5b4da3b35421266abf5502201f76254c882d46da63f9fa5e75a0d66ebee6428682e0b2408ccfa9fb055b2e5a3123d27cc2355cb4cf847d75219d002659a681e03511ea4ffc43ca9fc30494d1c80a4beef2626d9f9c069260344498f56e32ef3a7b9aaa0106f8fb5f1f1bfc4570d6ad31f33f462afdee72e7038374a9990228b76e1564f3edcceff3f046b73431e2ce9e4bd70580bf3e465ee3a7b1e6d6710f2114a34a97884fade8e42109ee3d56a14ed3dd527d860826fe5e53f98e4220296e6e01c667650e9ad45ffc3c62dca250491ebdf3c19ee3d1b605c2e2ecb96b8c9ad42f4548248627277d15dfbd6356f9d28d33100e6d8188f726e0d05aafb68c076cf3093e9b16be84a752c36701d588c1e49d521389d9b7603c679fb494fd1799d1101cdbaecd4c1ccd029896600d23f278ed4884b0dabfb89d64420780515c65ede35241234da86c1a1311884962441b02727f3988cc4079b144845fab7486c647fc7e67e168ebf1b72f13c479a5fa1fc86f1af00936fcf524cd955755786da24f69430ad576423d9533c6e05f21154ce470389803b33029d7a233abbda2841a0c33792f0c842d7e1931080041718611ce6cdd413e7aeda2ce7430949d05e13a2b168bf1212b456dbb38e4a93bc0b85ef2b7a05804c8ab63448f71b4d5790e0e107d72a509f20cacf461c67549249d4eb5ac3181f7962f62dc6d812ab786c646eded22c4fbf90edeee534ac0d44585fc2a7f532ec8d59dbc302b5c0060f6e60f243d169996a7c5057f8a50f534a58e0875e657d49e42db3b607316ba703858a28ba658e920398e69dfb9c956e89d75a3b07fbaef03b1a4b14e5a565ccb8940af68b635d36abf26ffcec37493d5d0c10ee38ed6d261ebb761a28d9dd2babc2c8cf08aafa7bfb33202404327c67b27e53fd79c1e028f42eb63da955a2096e1015a6eceb024ebde53033e7c83fbb60991867c69c30525aee461b2b236764320ac01bc686dd44a29c9fcbecac9a17b3a47d469713189df940258e12fd28dbb6488267457bb9e14e4cc9baa0bb3a397940749d515fe31d34040e054a6589cf65845a1f20033c9c1a58f0383d64bce7158c5aa24405ab8dd12e75d32e7d19ce10da3f3fde0e6b83d53b9eda87c8e28b2b14004bd17feb57d685ddac862670a60c1406227bb3e7c6ac56a484130208a017a0ae5e", 0x1000, 0x81}, {&(0x7f0000002980)="004791d6494e2a6c9be5605c2465c0411c15822544b353cbad9bfbd221f53676e781990fd7aa21f006a75afbdf884644b23fddfeeaea57a391f60827f7bdf66824aa827d79dc31339ed414027bf0576fc1da382eb0c13ccddf848e12c480457b2dc3f603cdfd972ead1b46e01a0ab80c686a02c3d307460c758771b371eeeca54121f29d8ec873dbc7c16f021d1979cb81031aec0b16c96acffcf41551ea44ddda771462bae038d4e350", 0xaa, 0x9}], 0x140000, &(0x7f0000002ac0)={[], [{@fsname={'fsname', 0x3d, 'fscontext'}}, {@uid_gt={'uid>', 0xee01}}]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1640.962602] EXT4-fs (loop4): unsupported descriptor size 0 [ 1640.981145] EXT4-fs (loop0): unsupported descriptor size 0 08:54:50 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1641.070982] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 1641.088336] EXT4-fs (loop5): group descriptors corrupted! [ 1641.093310] ADFS-fs: unrecognised mount option "/dev/snd/timer" or missing value [ 1641.101820] EXT4-fs (loop4): unsupported descriptor size 0 08:54:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1641.298276] ADFS-fs: unrecognised mount option "/dev/snd/timer" or missing value [ 1641.306433] EXT4-fs (loop4): unsupported descriptor size 0 [ 1641.317359] EXT4-fs (loop0): unsupported descriptor size 0 08:54:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:52 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x7a00, 0x3, 0x32}}) 08:54:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 08:54:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:52 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x9, 0x0, 0x80}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:52 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x300, 0x3, 0x32}}) 08:54:53 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:53 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x48, 0x3, 0x32}}) [ 1644.015804] EXT4-fs (loop4): unsupported descriptor size 0 [ 1644.039560] EXT4-fs (loop0): unsupported descriptor size 0 08:54:53 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1644.220524] EXT4-fs (loop4): unsupported descriptor size 0 [ 1644.227460] EXT4-fs (loop0): unsupported descriptor size 0 08:54:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x7, 0x3, 0x32}}) 08:54:55 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x9) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000009, 0x13, r0, 0x9df41000) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback, 0x8}, 0x1c) fchmod(r2, 0x0) sendto$inet6(r3, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000080)={{0x0, 0x1, 0xfffffffe0, 0x8, 0xfffffffffffffffa, 0x80000000, 0x7, 0x8, 0x200, 0x1, 0x20, 0x7f, 0x2759, 0x0, 0xfffffffffffff463}, 0x18, [0x0, 0x0, 0x0]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:55 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:56 executing program 3: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1647.092539] EXT4-fs (loop0): unsupported descriptor size 0 [ 1647.099632] EXT4-fs (loop4): unsupported descriptor size 0 08:54:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:56 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x2, 0x0, 0x8000, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:56 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1647.215511] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1647.229822] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1647.245038] EXT4-fs (loop5): mount failed [ 1647.285400] EXT4-fs (loop4): unsupported descriptor size 0 [ 1647.332821] EXT4-fs (loop0): unsupported descriptor size 0 08:54:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:54:58 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xfff}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='/dev/snd/timer\x00') r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) r4 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000004, 0x10010, r2, 0x23024000) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r4, 0x0) sendto$inet6(r5, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r4, r5, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x7, 0x20, 0x7, 0x3, 0x0, 0x9, 0x501, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x6, 0x8}, 0x48129, 0x1, 0x2, 0x6, 0x101, 0x0, 0xfff9, 0x0, 0xe2, 0x0, 0x89}, r2, 0xa, r4, 0x6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:58 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x4034540a, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:58 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:54:59 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345405, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:59 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1650.140506] EXT4-fs (loop0): unsupported descriptor size 0 [ 1650.150148] EXT4-fs (loop4): unsupported descriptor size 0 08:54:59 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x80, 0x2, 0x7f, 0x2, 0x0, 0x0, 0x12000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0x4}, 0x3000, 0x3, 0x503, 0x1, 0xffffffff, 0x6, 0x200, 0x0, 0x1, 0x0, 0xe4f}, 0x0, 0x3, r1, 0x2) 08:54:59 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x4020940d, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:54:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:54:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1650.378392] EXT4-fs (loop0): unsupported descriptor size 0 [ 1650.400727] EXT4-fs (loop4): unsupported descriptor size 0 08:55:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:02 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x86, 0x7f, 0x7, 0x3, 0x0, 0x6, 0x1400, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0xff0, 0x2}, 0x1221, 0x100, 0x66, 0x2, 0x3b3, 0x5, 0x1f, 0x0, 0x3, 0x0, 0x401}, 0xffffffffffffffff, 0x0, r0, 0x8) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000100)={{0x2, 0x0, 0x101, 0x2, 0x856}}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r5, 0x12) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x5, 0x5, 0x7, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x6, 0x46}, 0x1040, 0x4, 0x2, 0x7, 0x2ce, 0x5054, 0x2, 0x0, 0x7, 0x0, 0x9ce8}, r5, 0xc, 0xffffffffffffffff, 0x1) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000180)=0x10000) 08:55:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:02 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1653.125648] EXT4-fs (loop0): unsupported descriptor size 0 [ 1653.149436] EXT4-fs error (device loop5): ext4_fill_super:4443: inode #2: comm syz-executor.5: iget: root inode unallocated 08:55:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1653.171512] EXT4-fs (loop4): unsupported descriptor size 0 [ 1653.197505] EXT4-fs (loop5): get root inode failed [ 1653.207215] EXT4-fs (loop5): mount failed 08:55:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:02 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:02 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd\x00') r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000000080)={0x1, 0x3, 0x85dc, 0x3, 0x801}) [ 1653.330772] FAULT_INJECTION: forcing a failure. [ 1653.330772] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.342772] CPU: 0 PID: 25645 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1653.350669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1653.360319] Call Trace: [ 1653.363040] dump_stack+0x1fc/0x2ef [ 1653.366717] should_fail.cold+0xa/0xf [ 1653.370555] ? setup_fault_attr+0x200/0x200 [ 1653.374864] ? lock_acquire+0x170/0x3c0 [ 1653.378827] __should_failslab+0x115/0x180 [ 1653.383054] should_failslab+0x5/0x10 [ 1653.386837] __kmalloc+0x2ab/0x3c0 [ 1653.390366] ? __se_sys_memfd_create+0xf8/0x440 [ 1653.395018] __se_sys_memfd_create+0xf8/0x440 [ 1653.399506] ? memfd_file_seals_ptr+0x150/0x150 [ 1653.404166] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1653.409544] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1653.414558] ? do_syscall_64+0x21/0x620 [ 1653.418537] do_syscall_64+0xf9/0x620 [ 1653.422336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1653.427791] RIP: 0033:0x4665d9 [ 1653.430974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.450049] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1653.457759] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1653.465106] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1653.472535] RBP: 0000000000000008 R08: 0000000000030000 R09: ffffffffffffffff 08:55:02 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1653.479800] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 1653.487174] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 08:55:02 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1653.578141] EXT4-fs (loop0): unsupported descriptor size 0 [ 1653.633952] FAULT_INJECTION: forcing a failure. [ 1653.633952] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.653110] CPU: 1 PID: 25665 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1653.661030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1653.670398] Call Trace: [ 1653.673015] dump_stack+0x1fc/0x2ef [ 1653.676671] should_fail.cold+0xa/0xf [ 1653.680492] ? setup_fault_attr+0x200/0x200 [ 1653.684826] ? lock_acquire+0x170/0x3c0 [ 1653.688821] __should_failslab+0x115/0x180 [ 1653.693069] should_failslab+0x5/0x10 [ 1653.696885] kmem_cache_alloc+0x277/0x370 [ 1653.701051] ? shmem_destroy_callback+0xb0/0xb0 [ 1653.701068] shmem_alloc_inode+0x18/0x40 [ 1653.701085] ? shmem_destroy_callback+0xb0/0xb0 [ 1653.714455] alloc_inode+0x5d/0x180 [ 1653.718096] new_inode+0x1d/0xf0 [ 1653.721480] shmem_get_inode+0x96/0x8d0 [ 1653.725573] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1653.730431] shmem_file_setup+0x61/0x90 [ 1653.735114] __se_sys_memfd_create+0x26b/0x440 [ 1653.739703] ? memfd_file_seals_ptr+0x150/0x150 [ 1653.739722] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1653.739736] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1653.739753] ? do_syscall_64+0x21/0x620 [ 1653.754782] do_syscall_64+0xf9/0x620 [ 1653.754803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1653.754813] RIP: 0033:0x4665d9 [ 1653.754826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.754833] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1653.754845] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1653.754853] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1653.754860] RBP: 0000000000000008 R08: 0000000000030000 R09: ffffffffffffffff [ 1653.754867] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 1653.754874] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1653.806535] EXT4-fs (loop4): unsupported descriptor size 0 08:55:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:05 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:05 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x6, 0x1f, 0xc1, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffbff, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x10000, 0xffff, 0x8, 0x5, 0x7, 0x200, 0xfff7, 0x0, 0x7ba, 0x0, 0x81}, 0x0, 0x8, r0, 0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/shm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x94, 0x1, 0x2, 0x1, 0x0, 0x2dcf, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0x2}, 0x14300, 0x6708, 0x15, 0x9, 0x81, 0x800, 0x3, 0x0, 0x6, 0x0, 0x9}, r3, 0xffffffffffffffff, r4, 0x3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x3f, 0x3, 0x20}}) 08:55:05 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1656.160872] FAULT_INJECTION: forcing a failure. [ 1656.160872] name failslab, interval 1, probability 0, space 0, times 0 [ 1656.181418] CPU: 1 PID: 25697 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1656.189332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1656.198710] Call Trace: [ 1656.201313] dump_stack+0x1fc/0x2ef [ 1656.204947] should_fail.cold+0xa/0xf [ 1656.208745] ? setup_fault_attr+0x200/0x200 [ 1656.213082] ? lock_acquire+0x170/0x3c0 [ 1656.217051] __should_failslab+0x115/0x180 [ 1656.221392] should_failslab+0x5/0x10 [ 1656.225269] kmem_cache_alloc+0x277/0x370 [ 1656.229406] __d_alloc+0x2b/0xa10 [ 1656.233118] d_alloc_pseudo+0x19/0x70 [ 1656.236907] alloc_file_pseudo+0xc6/0x250 [ 1656.241048] ? alloc_file+0x4d0/0x4d0 [ 1656.244841] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1656.250573] ? shmem_get_inode+0x44c/0x8d0 [ 1656.254899] __shmem_file_setup.part.0+0x102/0x2b0 [ 1656.259823] shmem_file_setup+0x61/0x90 [ 1656.263785] __se_sys_memfd_create+0x26b/0x440 [ 1656.268352] ? memfd_file_seals_ptr+0x150/0x150 [ 1656.273012] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1656.278362] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1656.283366] ? do_syscall_64+0x21/0x620 [ 1656.287325] do_syscall_64+0xf9/0x620 [ 1656.291119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1656.296302] RIP: 0033:0x4665d9 [ 1656.299481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1656.318456] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1656.326173] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1656.333629] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1656.340887] RBP: 0000000000000008 R08: 0000000000030000 R09: ffffffffffffffff [ 1656.348413] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 08:55:05 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1656.355705] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1656.381629] EXT4-fs (loop4): unsupported descriptor size 0 08:55:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x7, 0x0, 0x4, 0x7, 0x1, 0x1, 0x3], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x8, 0x0, 0x3, 0x7, 0x0, 0x5, 0x1000, 0xd, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x10001}, 0x800, 0x400, 0x5, 0x3, 0x8, 0x5, 0x8, 0x0, 0xffffffff, 0x0, 0x100000000}, r1, 0x3, r2, 0x1) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e22, 0x3, @remote, 0xad}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x8, 0x40, 0x6, 0x20, 0x0, 0xe8, 0x52080, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0xf}, 0x400, 0x7, 0x3f, 0x7, 0xf20, 0x5, 0x1, 0x0, 0xff, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fchmod(r3, 0x0) lseek(r2, 0x0, 0x3) sendto$inet6(r4, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r3, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x1, 0x1, 0x5, 0x1, 0x0, 0x0, 0x200, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x96, 0x200}, 0x4010, 0x10000, 0x3f, 0x6, 0x5, 0x0, 0x9, 0x0, 0x9, 0x0, 0x80000001}, r1, 0xb, 0xffffffffffffffff, 0x1) 08:55:05 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1656.475726] EXT4-fs (loop0): unsupported descriptor size 0 08:55:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1656.670396] FAULT_INJECTION: forcing a failure. [ 1656.670396] name failslab, interval 1, probability 0, space 0, times 0 [ 1656.684498] CPU: 1 PID: 25738 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1656.692586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1656.702444] Call Trace: [ 1656.705037] dump_stack+0x1fc/0x2ef [ 1656.708656] should_fail.cold+0xa/0xf [ 1656.712459] ? setup_fault_attr+0x200/0x200 [ 1656.716780] ? lock_acquire+0x170/0x3c0 [ 1656.720745] __should_failslab+0x115/0x180 [ 1656.724995] should_failslab+0x5/0x10 [ 1656.729058] kmem_cache_alloc+0x277/0x370 [ 1656.733249] __alloc_file+0x21/0x330 [ 1656.737041] alloc_empty_file+0x6d/0x170 [ 1656.741181] alloc_file+0x5e/0x4d0 [ 1656.744725] alloc_file_pseudo+0x165/0x250 [ 1656.748970] ? alloc_file+0x4d0/0x4d0 [ 1656.752768] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1656.758393] ? shmem_get_inode+0x44c/0x8d0 [ 1656.762656] __shmem_file_setup.part.0+0x102/0x2b0 [ 1656.767689] shmem_file_setup+0x61/0x90 [ 1656.771656] __se_sys_memfd_create+0x26b/0x440 [ 1656.776230] ? memfd_file_seals_ptr+0x150/0x150 [ 1656.780892] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1656.786257] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1656.791378] ? do_syscall_64+0x21/0x620 [ 1656.795390] do_syscall_64+0xf9/0x620 [ 1656.799183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1656.804451] RIP: 0033:0x4665d9 08:55:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x440c8, 0x0, 0x0, 0x0, 0xb9e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1656.807803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1656.826840] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1656.834537] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1656.841802] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1656.849168] RBP: 0000000000000008 R08: 0000000000030000 R09: ffffffffffffffff [ 1656.856440] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 1656.863705] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1656.887668] EXT4-fs (loop4): unsupported descriptor size 0 [ 1656.925653] EXT4-fs (loop0): unsupported descriptor size 0 08:55:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000000500)}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:08 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:08 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:08 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6f, 0x5, 0xed, 0x1f, 0x0, 0xffffffffffff0000, 0x20000, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0xfff}, 0x200, 0x9, 0x3, 0x9, 0x0, 0x1, 0x8, 0x0, 0x18, 0x0, 0x3}, r2, 0x8, 0xffffffffffffffff, 0x3) 08:55:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1659.151611] FAULT_INJECTION: forcing a failure. [ 1659.151611] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.180450] CPU: 0 PID: 25759 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1659.188371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.197743] Call Trace: [ 1659.200349] dump_stack+0x1fc/0x2ef [ 1659.203995] should_fail.cold+0xa/0xf [ 1659.207809] ? setup_fault_attr+0x200/0x200 [ 1659.212145] ? lock_acquire+0x170/0x3c0 [ 1659.216133] __should_failslab+0x115/0x180 [ 1659.220382] should_failslab+0x5/0x10 [ 1659.224195] kmem_cache_alloc_trace+0x284/0x380 [ 1659.228879] apparmor_file_alloc_security+0x394/0xad0 [ 1659.234079] ? apparmor_file_receive+0x160/0x160 [ 1659.238849] ? __alloc_file+0x21/0x330 [ 1659.242752] security_file_alloc+0x40/0x90 [ 1659.247002] __alloc_file+0xc9/0x330 08:55:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x4, 0x80, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000080)) fchmod(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r0, r1, 0x0) close(r0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x113000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1659.250733] alloc_empty_file+0x6d/0x170 [ 1659.254808] alloc_file+0x5e/0x4d0 [ 1659.258382] alloc_file_pseudo+0x165/0x250 [ 1659.262623] ? alloc_file+0x4d0/0x4d0 [ 1659.266527] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1659.272592] ? shmem_get_inode+0x44c/0x8d0 [ 1659.276840] __shmem_file_setup.part.0+0x102/0x2b0 [ 1659.281799] shmem_file_setup+0x61/0x90 [ 1659.285825] __se_sys_memfd_create+0x26b/0x440 [ 1659.290406] ? memfd_file_seals_ptr+0x150/0x150 [ 1659.295078] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1659.300484] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1659.305495] ? do_syscall_64+0x21/0x620 [ 1659.309471] do_syscall_64+0xf9/0x620 [ 1659.313286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.318466] RIP: 0033:0x4665d9 [ 1659.321647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.340537] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1659.348246] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1659.355761] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1659.363138] RBP: 0000000000000008 R08: 0000000000030000 R09: ffffffffffffffff [ 1659.370397] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 1659.377704] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 08:55:08 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1659.399067] EXT4-fs (loop4): unsupported descriptor size 0 [ 1659.405192] EXT4-fs (loop0): unsupported descriptor size 0 08:55:08 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:08 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x32}}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f00000000c0)={0xfff, 0x10, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)={0x0, @aes128, 0x0, @desc2}) [ 1659.505604] FAULT_INJECTION: forcing a failure. [ 1659.505604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1659.518956] CPU: 0 PID: 25790 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1659.526863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1659.536221] Call Trace: [ 1659.538817] dump_stack+0x1fc/0x2ef [ 1659.542473] should_fail.cold+0xa/0xf [ 1659.546272] ? lock_acquire+0x170/0x3c0 [ 1659.550249] ? setup_fault_attr+0x200/0x200 [ 1659.554566] __alloc_pages_nodemask+0x239/0x2890 [ 1659.559352] ? __lock_acquire+0x6de/0x3ff0 [ 1659.563577] ? static_obj+0x50/0x50 [ 1659.567190] ? __lock_acquire+0x6de/0x3ff0 [ 1659.571407] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1659.576272] ? __lock_acquire+0x6de/0x3ff0 [ 1659.580493] ? mark_held_locks+0xf0/0xf0 [ 1659.584544] ? unwind_next_frame+0xeee/0x1400 [ 1659.589021] ? mark_held_locks+0xf0/0xf0 [ 1659.593067] ? deref_stack_reg+0x134/0x1d0 [ 1659.597280] ? get_reg+0x176/0x1f0 [ 1659.600815] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1659.606690] alloc_pages_vma+0xf2/0x780 [ 1659.610656] shmem_alloc_page+0x11c/0x1f0 [ 1659.614792] ? shmem_swapin+0x220/0x220 [ 1659.618764] ? percpu_counter_add_batch+0x126/0x180 [ 1659.623785] ? __vm_enough_memory+0x316/0x650 [ 1659.628274] shmem_alloc_and_acct_page+0x15a/0x850 [ 1659.633230] shmem_getpage_gfp+0x4e9/0x37f0 [ 1659.637564] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1659.642657] ? mark_held_locks+0xa6/0xf0 [ 1659.646707] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1659.651883] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1659.657078] shmem_write_begin+0xff/0x1e0 [ 1659.661308] generic_perform_write+0x1f8/0x4d0 [ 1659.666274] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1659.670934] ? current_time+0x1c0/0x1c0 [ 1659.674910] ? lock_acquire+0x170/0x3c0 [ 1659.678872] __generic_file_write_iter+0x24b/0x610 [ 1659.683799] generic_file_write_iter+0x3f8/0x730 [ 1659.688632] __vfs_write+0x51b/0x770 [ 1659.692336] ? kernel_read+0x110/0x110 [ 1659.696218] ? check_preemption_disabled+0x41/0x280 [ 1659.701224] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1659.706234] vfs_write+0x1f3/0x540 [ 1659.709763] __x64_sys_pwrite64+0x1f7/0x250 [ 1659.714070] ? ksys_pwrite64+0x1a0/0x1a0 [ 1659.718117] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1659.723128] ? do_syscall_64+0x21/0x620 [ 1659.727089] do_syscall_64+0xf9/0x620 [ 1659.730886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.736070] RIP: 0033:0x419777 [ 1659.739247] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1659.758133] RSP: 002b:00007fab52535f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1659.765830] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1659.773080] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 1659.780419] RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffffffffffff [ 1659.787672] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1659.794921] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1659.932982] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1659.994401] EXT4-fs (loop0): unsupported descriptor size 0 [ 1660.013731] EXT4-fs (loop4): unsupported descriptor size 0 08:55:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000000500)}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:11 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/zoneinfo\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0x0, r2, {0x7, 0x21, 0xfffffeff, 0x400000, 0x7, 0x5, 0xffffffc2, 0x8000}}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0xfffffffffffffffc, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/165, 0xa5}, {&(0x7f00000004c0)=""/249, 0xf9}, {&(0x7f0000000240)=""/27, 0x1b}], 0x4, &(0x7f00000005c0)}, 0x71a}], 0x1, 0x10042, &(0x7f0000000640)={0x77359400}) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$SNDRV_TIMER_IOCTL_START(r7, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(0x0, 0x0, r8) setxattr$system_posix_acl(&(0x7f0000000340)='./file2\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}, {0x2, 0x3}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x6}], {0x4, 0x4}, [{0x8, 0x1, r8}], {0x10, 0xe}}, 0x4c, 0x1) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000004380)="0630f11e5fd46ff0a9f1d20dedba0c1e5bb1de9451a29af78b4c59728b91a1abd61cf7a7df1716ba5d8a7723870881b5fe6449a5ae7d55ab61b2152562b374e9725dd3c77bef2cf9b8c4518592de7411e0a5661aebe2d3213042e09aff9f07475d7ceefea48999db3b90afc59dcf4fc72d26a3ae496517e8bc4ed5c7021e104d77e87a004eeffaf143888eed929b80ff3778e7d0616aa55fcdb40b37342749944c7b00573d8d6cca6327fd699191f5a3a26cb73e61cfb5bc08451293e94b382ac1fce538c54391746692e0f0fcc746a7f41ad8afb51ae3fb58cec601ac0589152db7f09f41e344410fcfc4e22fde20aedc21be1dda6e22a0c3feff0399197c71ea51539786495839f3a2995dfa918db6233a4ddad8fbd790d052e29dd1ca5b3fd946ebe1bb92155cd18a2f3ded3bd40907f59cd8683e8b125da094c58c46f8b912f2c380da9697371f0348bd612457c39140ac6b6d611810d29c1c46e08534041e68898841ac188177a6a1f02171a035c101bfbfb742ac923aaaa4d0cbd19356f8148a1d70c1a5cff5100672833622e31b1075a32bf0c2ffb366487df1720387622d99961285d6c40f8a2909f098e500995e0487e019d674196244ea62fbf48e6fec78755e14572f83fa7dd9e96c37ba139f1dd3549b0bf0b65d7d822fa101dc8465a52fab322a73344449e113c73461a4cedc8e7a89d200e667c5345e991292112d00e74f5124c3919d3b109761012a6f9a2cea3d09656e7c486f227326dd5784b4fbb4bcbed550afec74a46d7a1e6dc4c9cf8f44cb8ffa4ef202daab4ccbc4e5f7616347fece23c4e4af25eba6ca53b7591617ab48ad230fa00c28754d345df4835f0b40dd52c101a5a90a00eca48fb5fdfddb2adba3a4ced0182d82c31d7752b9a89fd7cefc0a1db2ce2bd84d8692ba42ba389bc66d06810a366925f71f9440eed7f09257e97bc304ecda5b6584e42dc8478579e5a70606ef2429a8f8e0437d875da8107af41205c827e2b9b1c321b5129bc1db75fc147e59c280f8f9baafa28da06bc24f8d4e78444b101db0a039556c35079a5191f7283f7b7e085c5b81dca426191be6533527e4d156c6533cb4fec86c62b7050e2c09a431255ccf8cc32655d3f12ece7dcb005c396ceabaced1715c63b0cea0b92d1f75ed20aaf78f4c24b4681173880c9eca12d532b8cbfaa8e5a3143bd2699e9121c3e7483f6817b5a50bf19c610482a0c6a8fd06ba02045798425d3807176d2214e4427bd45b2c7dd6a1dfb96d4038752efd0d056856cc256cef9111de62e05aaab1775b72d10799847ec394cf32fe8d0ac9c7978e7dbbb1d5ed5a4551ab67bb17e04acc608f6aa34db651893192671eaca8df469b492ea2443c4714eabc0c2fbcaa99f3b34d07bc3640300b838045f12484cb45b61addd5bf1830cb5c854e40b5c1c13d8321370366ee02488c7016a08151486c16ee5df4e0e02b0632f25b6d976bcf3351bbe1aba0763eca760f359227867d1a9294899f634428278d39be33297dde680dec975236178b0fe2f814ee72695601e7df58331a0042e39a4588f3068f4733cbca5d0bd5e68b648df62d2f2f5dd47eaa41928750d2f62ea5c672fee936ca712d9759880c93f61af6dd681c0e8889b0f6f3c9f146a6312384fc3a866831d8b951331bb11cce52d80fac86a53f59d763013d24bff29a966edd7c560d2d16f23de4c2dab03434f99a22a46d6960c1ea4bb9041f20a14a917c65d53735eec5d66209b8c0815beddc1ee3e7c629e18ad671413adfc2fef079ccd2f187c7fb5beef13dd6af1ec49708c32345001245a29c1da3070665ccae737c2e34771d8fa67bf164f731db7c3d893b8027046136bf4e89e515dc97be3b3819407323b3ebe90675144c432c2c03afeb761b873778748efc18ae25ecbe6c1e266174f03c2eede85f5e436134d8401a5ec9ee7bb0d7d7e60e86087f5cd44148426a9c2236d36082304e3604b9dc23c324fd2391725b22a2b52bfb68cbe47044c4bab00b8892fca833a7853feda5afb7a5ac919b04993e6390844cdc015531092542ae3ea86827a217cb19f2cacbe337f7735f1d1db52b1dac3fe81a73f2926c00b190c6814da33dbea7e681f5c18004ffbc9e4b6633fcca3eb9d5dd2c70edfeba81c44271db59e5484249d36441c18548ffd07e9290c3f27c6ef887840b1edd5a6e8b0117f28f6efcac0dab531b1d38a50e955324c66fec163a92997617c35274f88d57c00bcfb201d6ecd113d7ef47bc9a86644838b72fbd90f12103445ccf0c70c55c3df83ab2111e50b18bdac1b5ab977814728e775afe4ebb37411504474c50255b131ca70b38c968b420d3130cbf519f2f4abd517b15c5d8d667fd054a515dbb56baf03a8bb0a1c24e9fe2708027bdcf9f7df1e9fd9012ffb95aeee89251ea3484a194e0722f5be258b1e7e096971b70de6d053ca64c585ea0429cc111dcbee65d0753809c4b4499702607e8ac62dd1aadd50ad75333b170d7c89bf3a389fbf624b4970bb51c72d487fafac3c60e66076981cbb2bde7856708c5fed73062c555ddaca98300d73f49a8bcb805b8fffedbf462d9ddda2801cb2d4c9ead999d7a46cb42e99cd1f5cffa13f563f3e2355cbfb6394ae240f43bb6afcf0350bb19ad214d5fa327a96c933f10e59b4c20f25171d8a1df9457551825b57e3a4e3ee3df0e96a4180969bef67f96b37e9e40c874548691d26a30f04da5ff735c0b2d4c3274531a33c4c78f610805036badf0c16ce5f3cf2f7e36a35fc7ae0d0b0096e19bae0bcd6ad9485bd37333919a08475b3f65e55c797aeef838da3f2df2302201343ea7b1ce886df4835d177d6560e60eff4f58b929f635c746ac6555964bad6713e8a23fd1b20afab8f15d7d775298501a96fbbef2fb9b3a684ed5dc2c04e809bca4b0d2a86dc989007832d3a935cfa3c1e37292d7c72f40bf59bd9b4f24056a8fc45d4205169b810e83c1efcca3ac553bc6acfe3fb4da8acbad2784e262ae63f99e319192302a833d0e1af0908999bae92cb4de2396a317651ac31b0478a78e7d5388cb304e910462c478d19b72f44d7933335c130520a3518ff6ae77d1123855cb159160856b07dc1eb8d762a3c8c7d297bd8bd263815781830c4a603ab96187c823eb09e18f55f4105389cfc1ac2d5ab0209945c4d896170bb54996e25597819a79010384b3b761ecfb1240fef073a1638864034a9d32cd59c41482b0b144ca560a49f3b5a6d78a954c47c516736b36b2669429cf431df9724b4b6509a383859e388f9e642af71dc000bdbcc39c04799a12b50e4eb922e7a1bacf95bb128d8a1feac612741274da3080c483fb87e3843c9a671a58494df2e54b5ce3702ca84c607a4309f5d14d5f52a82147a870146b6320fc445017b0ea45d419c8c1eb5e10c7d85d61236de3610ed77b20bd78a56a72b662a80b7692d09010177f340f6f9345751cf8e5fbef9e658459a259066ff80c046073a17aa7bd8ceebc271ebd76e920f660b27bd014969169a797802c0bd25f69027f6137a87aaa8f8dd80da48b3cf05439a3ae83ce16aebf34e7d6aac9ec072c4c6c3474005d615f571e6e4b23e8f47ebc28cad9fe3bd25d2fc273721e2abe253ac82a59059e38a258485cf80f194280d06d712b17912d04e554ac65e3e96afbb20a8d5d63d15ceef3eedfc5d043204ce03d7c433c7fff1f20307bca12dde2d914bc483c59203f86170f30639acc277c6c1a2453023e4f62c2af7bc1473f481e6d3ea530399c352fd52630b12cb91b35c86a0dd918291d197d4f9865ad428359b02490642d3d1ea926a02627076ac7b5bc78448d85159180ddbb2b8a4b353f43b5d1d370c79cc5ea67bc50bd000d299e97909e24b7b6d87d7e46c0d9a7a29dfe1af75693352f5aad6d203e0eaa5f5b2a9a5110659a6df37c2affcc5a1ebf6f4c673ec352d55e0c5d3605fa0f009501988dd1d83b511f1638c2fbe6361ebaa6805020a9215b82481cbd6a7bd4fae64da92f1c587f4d16f1c27119f58a53bf39dcc6954608432246769ac8a944e67e626cfe36bd45bf4fcc6e2ef1de536634cc854f2adaaf10964314a1d1e1c09469e82cccc9621fc6ee6d874b2d839b9a4d32bba53c5d424d74899bc8cc53ff46e677d7bdd2699c4dfa9cf2eb99c2342bc7cbd14417232fc1bae3ecae386125efcd2c496c2536043e5ebde32d22270aac44042ecf14c2917f6a61ed634ee8d4d6acaf824daaa220cf1945e631102c6529632d25e2e8a74f0ffd8af14540321fea6e7bfa5f3e643af54406d5ce2a98e3781c15bdd3a5c8a3352b7e0bfb5f0f3bed63358c454d3ab2f03ae36600900b69070c9a620c2e4b7ff9dd0dd360e0b95d1f3fb10733ccf0beb7edebf0b33d9686a659505029915301f9f8a57e9a7fbd81c74313737f7519151ff2e27a5e70737331edabaed832abbea220af248d9d3d013b5bb288ad1904d9ebe2f373d6144300ea528f23f5f62268bdff91c5d0a82692b5dcce0329176775d37a786ff0753236e8b0e12ae24b30cd6ea9e98fe0ca5e93774b13ab0ec05a60afc0d9041c2a027403d2a64105b56190257de4d4f25d86c2d6d3c17148f468c5d0cfcd249cdf0f2f131ecb1cc1f3dadcbc04481a0d61c2591e4598f690f0c2c0782d160840dda5df616dc82c1ff0a2927714ee2d76f452a04e3fd2d13617334db9c7ab5bc627e95b702da7ea5e18bd014fb5254b22514e0c7730aa32f2ab530335d15b8c1920ba60ffbd3dcbfe8a5f25ed119b5810f24c40e60284eaa13af6ee6eed74d07e66d9dc4037907bb242c7ee742c50197f5980730833863880b06efdddb959712073d35cbbe1dc03a8573b605b33ffb0dd51e93de637fcbe404d75707eaec102dec5327951efb894986f20ab9819f1123799b918b44a1ddf60a090ef1c3b181781bf1ec5c843d163d6e9706bf6f3d47bd5feea97deecff720b68d4287e9305300276f9200f088f66ada636b5395a6b95f0efde55158bf688ef2b8f28d758f734b3cf96ed20ea16dd0db320837a5c19c541a20395ad8eb7345256f5e0f035f71b509dfefee4526ea2e6f9a9b2b81ab40faaaefbc00720b0f49500388c1b959c565b4fb7786fa5568d1a9afa6300c0c3a0cc4b40a4ce7bb89c0963c4556af4e76983a8d5c55dfbc057906add2c19ecf86f2f8da2c73f75c3d5c8ecf5b729579350aa8bc38780a2959366cc3068dbeb8cb952d9d0f39b6ce80fd09816f34d4723b3ee74d8909736872550934e6f68242d5b819c46f9bc65623709b284409d7a945083ab0ceb065ff9f5120c5e3310cb5fa5b5bec059217acc7f7ddbc25c4eea66ab8f19fed4ea6d10f4692dd092270f58d5d82809aefdde0cb87e151b0930b2c95b0a2326c706f6b5d9d31ff9fed2c0e7d8ff12630e393496259e6814cf44536036f04417076753cfbdeab3e61b5ed50aea79d65fd5d2a5c4b7964ebe7982853e51efbadd0edfd23d72e770ddf49164afa9b81da9d5bd089be77ddc5a729017c9047e722ba21196a8d78cabf53c6958215d5ed548230530ccf66ec3b796f3c448be9718e813f4e66022ed85ee456d4ea2b6a2f8973ab82bd4883ebacf663a3677a6da0c39d0b1d837e7992fbe0305e89f34a53ab5be921c2129604682bd5cddf4abc25b7886304de0147ad1a0f96ced9313a9041f141e8d9879a681093cec693d7f19881b7c3bfd7e75d7b83b1e8f4d9a44fd7957e50ce72c5041df9e4f40e812369b0aa25a9db673a5289ec0b42322c501f4c43bdb1123d61679640e1539ead869971dd72b520a976c0e0ed40ac219ce3635dbdcf5f466c6da25bedc64ae64050c6072f66fde610c715dcd04f7d3ed1b2f40ce0ff399d55b2c9e7798b44d899963794f0ac9bfd4e5a99a9d5fd5cfaadc0ba78107d830c8cbfa2e828ce671607471fb5dd42d7673d2b3ef17766fb1a8d4f26c92d8f033a4dbf523261209da0aa5fd05597106df0fb9ef22381dcf26fdd643f11ab0084c6975414a5e8529f7ed5223dd7b0013ba5273b2943d739ba9544c23396422b8fcf422a8016f88ca50ff3e3d9e6d8b9fb7b320ff45d6e9e42779228f58ea7bb7e8240c4e0eedab8965b30189b9d509ef1c940d7ce4904e07746e4494d3e1045fbf00ee7d57adde5e2eb77249ac01af423b0b19e922d8971ee199908d285877f8a61e891447d16a22f429c45e4f34b0c762045a3008f65003740639de356921f44eea1a8a8779d634aa9d492552679516e94eaf2f4b97756a7535619875dc5d43fe56fa8312af6da4282fe0cd50be896f2c0085b5ae149debbc7b4aed475b32a6d33a2a6901ae91f8f5effac4ac4aa0b7c37017c365001aa46e8ab35e1bae2f2f0f7bf636cb7dabade6f00154b61dbcc29ff44102ec409aee82194ab0f8259f05438649e2754bd46760f212e33c2277179f5d16102defb4f619f3b6e03636a744cb8c3c5fb9153c241a9e1ffd9b92bb2c90200ca67ecdf0b07105e8a6c46e949c0b3dbe6dc3664eabe4681a06f04b6834aca015684ef8a64b4cc2cb1c4dcb16cecfd384bf6b2b1483881f19aa1643d4b3f5249460cd83effa708f6ec1d7a719bcae8f549c0fa74691ec873dd4e8d7c4bfaac18f4229482dfa576f9e3eea8e42a73ac06428935aacaf554d9ef9b64d08af4e96c20892e6ba2fbdf76516a82cb37dd5f3dbab748a794b4fc188ab5f3eca1008dfac883606a664e6101f3b92bc3d3a8d1e9db53bfeb5682d07ed2dad2578ef04f42491d42b527a57c3fba8d6bdf5ed8b6aee6f8478270b4ff68a460ecc531579163939faecbb851034e57f761413aabc7b52393640f98e00bef1bb3aa83d8753857b5e98d6e46321f1e211174c9a07960561560403f6e89dc428c521c4814eee7ef052ab3701f8ff318c536a13046528ce4816d8d7c2f74b8b006a8ad86bce82f0d2ca9655103cfcabae729592fabdd80273a24d780c54ae71182797e1963551bc0b382d5daeba00301c10b6ed3784bf983ee6ef07a65cb1cab84b3f9ad17db253aa87012b788e48e6dbc6512e45aeced7ab0adafd08af598155b54a59f416813023e4a2c48eee52889fbe15813319fb236a33010d3b50022f3672a228d327893c4de84cb0682a9e8fa0630a0b697745fe78364041cf7aaa38904c67602c22ed11209d842263e38799e3d2a140732650a47f3be78be4b0750af991c917ccd61bd33eb83a51e46719b41c0d6a69d74c024abb47db4384cb532345982ed40e39fcd8084e979ef27801e87520ebc0c9c4d53861669e7f9f62ea1215c876e22aa3c23fde76068ccddbea016b37a0321d375abe4f8bdfd3792adb1ca84a0451bf8bdde4a9f1703e297e599717dc952b7da1730f29ce9f7b0893231a360c5c1e21e324d5008cdf9553f31e7de705175568a150371315b316ae01ad6190f10a25e23bd36338788dc9f8793ec7422d5d6315a3a5d6cd328be8567a768f5d8896d940ddda8a65937b2f0892c0a16d2001e4cf0de7ee65e142f95fbd783c8956b012bbb70d07070a1cfa718d72104f39781add0215c8bc9528fd6db2a40f4543116c517c06fd2cb6418df0cac195458b4e07515af4b88879b6efb9126f06e1c932e358db4127db90732ebedc8f4fcb1c5624c299a4eb488dc7beaa416e8c2e83ed3ed643db0f715b525904af97cf918bdd898de71e157915b6001bcd9adcbca5dfddb971bcd61ce762c4369a1bbd2dbf969f5855903f3baef56727c742825c39a1167a6b206462d406a07308c4af6ea12061834ab26cebd963a18c9e7e1fe771de8323ea912201a96ac352abac5cd3268304e3ba3e460586f1991ea6ea57eeda0ef399675fb10ffa903aa256aa92a01375cd5e00751871549b228cba5c78ecacbad26182609275670cbb88a8a45303da85f6c18a8fb812e10725a9ca0ec8c699926d315f3339ac5e5ab6ebbf3b44ce5ac444854c9f70302ec47cdef2f9f707e7b3222eda9742a1d52a1f1957a10f6aecd59c5a9dd9b95e1cd243a96815209b337c8346afaac588ccaf2ba131db525fd0c4606527e75b4b59e6370a79ba90615ba2a95fa9bb5dcdb3669a683482b6e9270fb629bcbb781ef82be7908abe61565b94a4d8542e998dd24de7df29b0b7a247fa6bdb50a481ca0053a5025e1ad978e4834b05468991e3f265317d779fea5687a3fbbb7ea8e1aee17de4ed2dc854a6d877428fc09fe73876c51b17783d023483068b950d77897fae7698cdc671e19ffd3297b082d576a550eaee15aa37447e04022373b2b973a7287dbbbc350934440d00673294edc8319fabff9ee89151f523fda810d735006b3847b030614f99cd643405215fd70404ac5ecc0f9e93671808cc832f16c8fc24e4ce8add92942a661bfe905468a5e0c47b1644d01b786459144e5a855c78675ab0c91cdd46412095703d15dc6c2414118de6d702cb0eff1bb062f403546143d784a21facd73b63801c0a67926be497099126eac31fda8a7eac80563d7d4076265490f7284eb6df3a9086d1aeb66015dc1c595854992dac65556e1132235b03a699f381fe17545c9036655d6c7755c5c911a5b47f09ebf5143c77d09820ffda962eddece25afa9a3cd59a81f7b671d95d854eeaa19175df83bf5eb6e262efc14f09f2778c94ca1eb55d87260d05d5ba1d12ebcf676891dd5bc712e32270dbf34f2239c9a6893f802b0417970f708845fafb72ea07dbf4f0ac4331920697784859a0cfea866c178013d3db2d0590a83e64309f563281e59705eb11bf1ae420b7c2cca0c00edfe33ffeec817fbab99525c6b467b5dc198a0f7b5ab4c2627cdd5542d60ac5c9fbc316e7cfd291ce9a97031901a4bc774ee6a55055b865046b2542b3dbd5d052d93f75bdfb2fc606e842c842d57f322803a115affef0ebf89512ab6ec35364d20e2a8f0808fecebaed8129b60c345bb681ce3e839fed8e1a28f073bdf5f8363e3d6b4151a8e04f25c6ba8dade315bd1692119de2364176d19b373bd9b12b5148bb6bedc4070a63fc6cf3d2b4b53a6fee2b7e21a6595942a5b6e7839c9bf7d9fd2fbc38b5d20aa1a4c1581369143d5141e48b7404328faca587f908f371943fb078bd94eddfdbe214dc0e1d98448ee595beb0968416f64fe0be035066e1ec5c8c3bb629a40653435407ac51566dcc3fa8a030d862fb949256f0b9005e0d6597172cb25873af60d6223a81e102a0a219635d62dc1fb35301a79797bbe7e78b814e0b794cc04fe60dcda94ce9bdc91fa5ebcb3d998a0b55b5237f4f9d790bf25d786a243685ec14cd571caa2339559a5630e10e463f6bfc02221c3158ae592be032f2e44f5a8e067ffafebff905e4dfbc5519c7e9eed1ff1ecc653ce0e13eda3e0bcc724c2d6807ef2d31b11458330a7feb7568d14332183d87586f996ba737398743880f570bb6c6bafa7bb195424f76e3e825d0742ca2a2c2a49cee41460120ab3c7fc74a9eb387621660578e425b35d1265740534c95bd44049d5e268bbb1b795fdc66f30c3c0454b579216352b154c41e1811f1b6ea76b42ffafc74903672c8e8205cdd7993a403df35b4fcd0f76d730b1c5f9ca541666d9a82da81d18b29867bdd76affbe1589150d6fbec873ebd0234a27e38d20f00f1ee600fb55e892e84cf0a3c850c8a106eb8a41552e0c1cf7703799f903aaf77493472ecfa431b6451f3f7f61511fccb9db91f4a595215a32e199835a513f30aeb1f4072d5dab43295958f84e41e9805070f2e7eb660700342ace1224b1d5400853fdd20d7ac97dc8e150570d94100d22b088125a59f02eeba56810bae449ad0eeab6e39a68d788eb34e2a7779557bc7687d314ad2570318b3bdd961fe8b1584239a523a09b994a3f13d141b475eaf922938d6511361faaa47f88083bf4d4fe2ba3c3916bc5a2cae848156cde4fb588e370d436410b1e17857545c248e6c26382bfce728259010a7e531a00a3f778756427cb81b1f10b620e73611628ca64ac11795a13dddd9e3caf9b85e46848c1663079e40b77c819d32ceb5a86d37199ee10028b90223b878d8fc295bed4ff110d1b2ca16748d9c5d7fc1b4cf17a96912a46334750732e5d364aea76559848b20c1b43808fe3cf480a0fed32e198f3ad4bb8456ada78aa9bee86e66e3670f60ebac1d2f6316767202c7be9d5b44dcd64422ef5c612f7ed18034e09fa5dc9ab5c394ceaea5731e8549cea77b3819497873482da45e1288ac950fe4250a06c9057b43b6d5aeab6d13387f19590f574e609c37ea98d242f84b9a82eecf07d88e75130adc36edce580bd10f97a952cafa869e1b32d4fc84aa12d18db4d61ba6c342f4894e8c53756a80c5e2cd3d71f456d535cc5ae0dadfa6db2b2f80c49c046fc9ab9f7691b7048f8e2da8e811ca4ffd6f02cb92029ab447b3f4661aef1285e7cabea1c035dcb5d31a25ece41989f89390577e6c35a5984518c6e3fa9f2b7f128bc1a4f43930618f70a3d69851269e2b938b12af1547be5cc622056f090fb3251a4a4374296cff884b7935ece70674a1bed834e18f1c5d5a91d654bbb6937155d8a2e1dc0ea7bb819474af4e78d44aef8ec0aeb40f207a4ed3b8df6336ff1d37e27d7a585b231573f9b0d7bcc64756241d05018294f5865705f0c7951ecae9984e32c73f6bbe78e2fb3954d86fdbb61d294502b54a70935cd09a845ec221cb20754e0698641ecedcae2a854a8e371932d9c61824a1c65d2efe24b620e158b95206675e053132ee40a185722801485b52beab65dbb0a7735fbc3db12a3fdfae4b55fd3ad8d566aa66292c4cba7614a1f20d03ea9ea75e0246e3c20a1d8424c8701ae79afa2551c4a8fb39ae1a0b02b8265c4cd93a95760d3a733a9c8ff698ab2a41f693b0efccc440faf8f1ba177647cdc4fb4b6b2d2c8fb70024755f48d55565b1908afff703aafab71098098bcd3dda687c05155116d9a055f92357b4d158d5105074e7bc0d5c6ecf73b6b291508e570b9d02d10502adbe32e21e3e9f2d56b60fc92230e6ab6cf85acdae64f162a6bfdc712123a09b3c4a63301af47e4c756ce0be14b05abe8e19a59e410096db6a4394be7babf677a77b72bd0eaa5594011fad1c7dedd24c3470677e3e102f38a719ef3d52f7d7742a3adb24734230d9d7d165c8889cc87eff7f30ccd55b7c0ad935ea70300ed45a11bd38b6e123d61dd7e3e6975176f21cc8830bc690488f787a9da5e7427ad504f89fd32bb973b7107182d1fcc36af19a069c681c23ae5946951a2c0d89954aa41477356112e0cd9c5d128b66bc8048e3ffaaddec088fe84068e5bd30fdbfa48f49c2c19b0b38340be0c89c0d703e46b3a649432b92757d52fdeb6122ff892e7b6a2291d4e3bfc24575a8a24e112c3e058af93867ce064414ce158f44abb24d4305fecfaf8964f863b87f61bd4e30ca5b1cd1bf127e93c8c93c042c8f7223d1d40c61d1850278ffb3134cc10e17d7ce0beaa12c4a7ad4f2abb91e25ae9e11e359a43a612e145cdb18d1f54cb67dbeb54f5626742ffde31de6f60016687ed30c5cdad019b52a987c472a4f84f009952da336bfe7bd006f5bf04fb0aafebbf33d4f4bc7a7c2e672a149cb810503", 0x2000, &(0x7f0000001340)={&(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21, 0x4, 0xc08000, 0x4, 0x7ff, 0x2, 0x6}}, &(0x7f00000005c0)={0x18, 0xfffffffffffffffe, 0x100, {0x101}}, &(0x7f0000000780)={0x18, 0x0, 0x100000001}, &(0x7f00000007c0)={0x18, 0x0, 0x400, {0x80}}, &(0x7f0000000800)={0x18, 0x0, 0x50, {0x2}}, &(0x7f0000000840)={0x28, 0x0, 0x7fff, {{0x100, 0x7, 0x0, r5}}}, &(0x7f0000000880)={0x60, 0xffffffffffffffb4, 0x0, {{0x100, 0x1, 0x3f, 0x400, 0x4, 0x9, 0x3ff, 0x5}}}, &(0x7f0000000900)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000940)={0x13, 0x0, 0x8, {'/-\x00'}}, &(0x7f0000000980)={0x20, 0x0, 0x20, {0x0, 0x2}}, &(0x7f0000000b00)={0x78, 0x0, 0xd1, {0x9, 0xfff, 0x0, {0x1, 0x3, 0x7, 0x8, 0x3da5, 0x1359, 0x9, 0x100, 0x0, 0x1000, 0x7, 0x0, r4, 0xcf5, 0x3ff}}}, &(0x7f0000000c00)={0x90, 0xfffffffffffffff5, 0x0, {0x2, 0x3, 0x8000, 0x6, 0x3f, 0x100, {0x4, 0x2, 0x27e74, 0x3, 0x8000, 0x0, 0x7ff, 0x3f, 0x7, 0xa000, 0x1, 0x0, 0x0, 0xffff, 0xe096}}}, &(0x7f0000000cc0)={0x50, 0x0, 0x3, [{0x4, 0x1, 0x4, 0x3, '{r*!'}, {0x5, 0x101, 0x3, 0xd9d, ')).'}]}, &(0x7f0000000e40)={0x3e0, 0x0, 0xff, [{{0x2, 0x1, 0x5, 0x3a28, 0x0, 0x81, {0x1, 0xb75, 0x5, 0x1a, 0x100, 0x7fffffff, 0x7, 0x1, 0x4, 0xa000, 0x200, r3, r4, 0x7, 0xffffffff}}, {0x2, 0x0, 0x1, 0x2, '\x00'}}, {{0x4, 0x3, 0x5, 0xffff, 0x3b0, 0x6e, {0x4, 0x400, 0xef, 0x7, 0x1, 0xfffffffffffff23a, 0x3f, 0x3, 0x4fa, 0x4000, 0x80, r3, 0x0, 0x9, 0x5ce}}, {0x1, 0x7ff, 0xf, 0x8, '/proc/zoneinfo\x00'}}, {{0x1, 0x1, 0x2, 0x3, 0xc0, 0x5, {0x4, 0x80, 0xfa4, 0x0, 0x7, 0x1, 0x0, 0x9, 0x7fff, 0x2000, 0x3, 0x0, r4, 0x10000, 0x7fff}}, {0x4, 0x6, 0x3, 0x5dd7, '^*,'}}, {{0x4, 0x1, 0xffffffff, 0x39, 0xdff5, 0x4, {0x6, 0x5, 0xfffffffffffff642, 0x25, 0x3, 0x7f, 0x4, 0x3, 0x1000, 0x1000, 0x5, r3, r4, 0x3, 0x5}}, {0x3, 0x9, 0x2, 0x6, '#&'}}, {{0x3, 0x1, 0x0, 0x1d, 0x1f, 0x7ff, {0x6, 0x6, 0xb51, 0xc5b, 0x88, 0x4980000000000000, 0x401, 0x0, 0x1, 0x4000, 0x9, 0x0, r4, 0x9, 0x3f25}}, {0x6, 0x1a9, 0x1, 0x0, '\x00'}}, {{0x6, 0x1, 0x7, 0x4, 0x80, 0x6, {0x3, 0x400, 0x8, 0x4, 0x3, 0x8691, 0x7f, 0xffffffff, 0x0, 0x4000, 0x6, 0x0, r4, 0x20, 0x8}}, {0x3, 0x8, 0xa, 0x1f8, '/dev/fuse\x00'}}]}, &(0x7f0000001240)={0xa0, 0xfffffffffffffff5, 0x9, {{0x3, 0x0, 0x80000000, 0x0, 0x7f, 0x95e9, {0x3, 0xfffffffffffffff9, 0x101, 0x3, 0x10000, 0x2f, 0x401, 0x875, 0x3, 0xc000, 0x0, r3, r8, 0x80, 0xffff}}, {0x0, 0xd}}}, &(0x7f0000001300)={0x20, 0x0, 0x7, {0x4, 0x4, 0x1, 0x1}}}) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r10 = getpgid(0x0) write$cgroup_pid(r9, &(0x7f0000000140)=r10, 0x12) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfe, 0x8, 0x8, 0x28, 0x0, 0x2, 0x40204, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x4}, 0x0, 0x1ff, 0x8000, 0x7, 0x2, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x200}, r10, 0x3, r7, 0x9) 08:55:11 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:11 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1662.286059] EXT4-fs (loop0): unsupported descriptor size 0 [ 1662.296585] FAULT_INJECTION: forcing a failure. [ 1662.296585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1662.316405] CPU: 0 PID: 25839 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1662.324322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1662.333681] Call Trace: [ 1662.336276] dump_stack+0x1fc/0x2ef [ 1662.336323] should_fail.cold+0xa/0xf [ 1662.343729] ? lock_acquire+0x170/0x3c0 [ 1662.347724] ? setup_fault_attr+0x200/0x200 [ 1662.352063] __alloc_pages_nodemask+0x239/0x2890 [ 1662.356983] ? __lock_acquire+0x6de/0x3ff0 [ 1662.361242] ? __lock_acquire+0x6de/0x3ff0 [ 1662.365477] ? __lock_acquire+0x6de/0x3ff0 [ 1662.369707] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1662.374536] ? __lock_acquire+0x6de/0x3ff0 [ 1662.378767] ? static_obj+0x50/0x50 [ 1662.382503] ? mark_held_locks+0xf0/0xf0 08:55:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = userfaultfd(0x80800) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r3, 0x29, 0x35, &(0x7f0000000180)=0x95, 0x4) fchmod(r2, 0x0) sendto$inet6(r3, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x80000001) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000080)={0x8001, 0x0, 0x4, 0xe23b, 0x3, 0x101}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000780)="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", 0x1000, 0x40004000, &(0x7f0000000100)={0xa, 0x4e24, 0xffffffff, @remote, 0x8}, 0x1c) [ 1662.386761] alloc_pages_vma+0xf2/0x780 [ 1662.390773] shmem_alloc_page+0x11c/0x1f0 [ 1662.394968] ? shmem_swapin+0x220/0x220 [ 1662.398973] ? percpu_counter_add_batch+0x126/0x180 [ 1662.403998] ? __vm_enough_memory+0x316/0x650 [ 1662.408511] shmem_alloc_and_acct_page+0x15a/0x850 [ 1662.413457] shmem_getpage_gfp+0x4e9/0x37f0 [ 1662.417803] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1662.422929] ? mark_held_locks+0xa6/0xf0 [ 1662.426998] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1662.432190] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1662.437482] shmem_write_begin+0xff/0x1e0 [ 1662.441623] generic_perform_write+0x1f8/0x4d0 [ 1662.446196] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1662.450850] ? current_time+0x1c0/0x1c0 [ 1662.454824] ? lock_acquire+0x170/0x3c0 [ 1662.458798] __generic_file_write_iter+0x24b/0x610 [ 1662.463724] generic_file_write_iter+0x3f8/0x730 [ 1662.468481] __vfs_write+0x51b/0x770 [ 1662.472193] ? kernel_read+0x110/0x110 [ 1662.476084] ? check_preemption_disabled+0x41/0x280 [ 1662.481109] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1662.486113] vfs_write+0x1f3/0x540 [ 1662.489742] __x64_sys_pwrite64+0x1f7/0x250 [ 1662.494048] ? ksys_pwrite64+0x1a0/0x1a0 [ 1662.498106] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1662.503115] ? do_syscall_64+0x21/0x620 [ 1662.507094] do_syscall_64+0xf9/0x620 [ 1662.510882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1662.516072] RIP: 0033:0x419777 [ 1662.519258] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1662.538254] RSP: 002b:00007fab52535f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1662.545948] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1662.553203] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 1662.560456] RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffffffffffff [ 1662.567706] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1662.574966] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1662.608980] EXT4-fs (loop4): unsupported descriptor size 0 08:55:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x8}, 0x908, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0x2, 0x1, 0x5, 0x1, 0x7}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$TIOCNOTTY(r1, 0x5422) [ 1662.690338] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1662.723654] EXT4-fs (loop5): group descriptors corrupted! 08:55:11 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:11 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1662.813860] EXT4-fs (loop0): unsupported descriptor size 0 [ 1662.839510] EXT4-fs (loop4): unsupported descriptor size 0 [ 1662.899638] FAULT_INJECTION: forcing a failure. [ 1662.899638] name failslab, interval 1, probability 0, space 0, times 0 [ 1662.911660] CPU: 1 PID: 25888 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1662.911698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1662.911703] Call Trace: [ 1662.911728] dump_stack+0x1fc/0x2ef [ 1662.911748] should_fail.cold+0xa/0xf [ 1662.911766] ? setup_fault_attr+0x200/0x200 [ 1662.911784] ? __lock_acquire+0x6de/0x3ff0 [ 1662.911802] __should_failslab+0x115/0x180 [ 1662.911818] should_failslab+0x5/0x10 [ 1662.911832] kmem_cache_alloc+0x3f/0x370 [ 1662.911855] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1662.911876] radix_tree_extend+0x191/0x4b0 [ 1662.911894] __radix_tree_create+0x448/0x540 [ 1662.911914] __radix_tree_insert+0xbb/0x5f0 [ 1662.911931] ? __radix_tree_create+0x540/0x540 [ 1662.911944] ? lock_acquire+0x170/0x3c0 [ 1662.911958] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1662.911977] shmem_add_to_page_cache+0x616/0xbb0 [ 1662.911992] ? shmem_recalc_inode+0x310/0x310 [ 1662.912007] ? __radix_tree_preload+0x1fe/0x280 [ 1662.912028] shmem_getpage_gfp+0x2004/0x37f0 [ 1662.912057] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1662.912071] ? mark_held_locks+0xa6/0xf0 [ 1662.912083] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1662.912100] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1662.912118] shmem_write_begin+0xff/0x1e0 [ 1662.912139] generic_perform_write+0x1f8/0x4d0 [ 1662.912161] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1662.912171] ? current_time+0x1c0/0x1c0 [ 1662.912188] ? lock_acquire+0x170/0x3c0 [ 1663.051252] __generic_file_write_iter+0x24b/0x610 [ 1663.056186] generic_file_write_iter+0x3f8/0x730 [ 1663.060941] __vfs_write+0x51b/0x770 [ 1663.064651] ? kernel_read+0x110/0x110 [ 1663.068541] ? check_preemption_disabled+0x41/0x280 [ 1663.073545] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1663.078545] vfs_write+0x1f3/0x540 [ 1663.082188] __x64_sys_pwrite64+0x1f7/0x250 [ 1663.086659] ? ksys_pwrite64+0x1a0/0x1a0 [ 1663.090844] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1663.095980] ? do_syscall_64+0x21/0x620 [ 1663.100207] do_syscall_64+0xf9/0x620 [ 1663.104295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1663.109487] RIP: 0033:0x419777 [ 1663.112668] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1663.131561] RSP: 002b:00007fab52535f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1663.140021] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1663.147308] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 1663.154573] RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffffffffffff [ 1663.161857] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1663.169235] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1663.277558] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1663.289157] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1663.315915] EXT4-fs (loop5): mount failed 08:55:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000000500)}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x10010, r1, 0x2d351000) 08:55:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:14 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xb0b9d6c9, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:14 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1665.327521] FAULT_INJECTION: forcing a failure. [ 1665.327521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1665.341810] EXT4-fs (loop0): unsupported descriptor size 0 08:55:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1665.387536] CPU: 0 PID: 25926 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1665.395538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1665.404893] Call Trace: [ 1665.407534] dump_stack+0x1fc/0x2ef [ 1665.411169] should_fail.cold+0xa/0xf [ 1665.415101] ? lock_acquire+0x170/0x3c0 [ 1665.419070] ? setup_fault_attr+0x200/0x200 [ 1665.423388] __alloc_pages_nodemask+0x239/0x2890 [ 1665.428154] ? __lock_acquire+0x6de/0x3ff0 [ 1665.432554] ? check_preemption_disabled+0x41/0x280 [ 1665.438030] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1665.442873] ? __lock_acquire+0x6de/0x3ff0 [ 1665.447140] ? radix_tree_node_alloc.constprop.0+0x1b8/0x320 [ 1665.452951] ? mark_held_locks+0xf0/0xf0 [ 1665.457008] ? radix_tree_extend+0x3d8/0x4b0 [ 1665.461424] alloc_pages_vma+0xf2/0x780 [ 1665.465405] shmem_alloc_page+0x11c/0x1f0 [ 1665.469565] ? shmem_swapin+0x220/0x220 [ 1665.473535] ? percpu_counter_add_batch+0x126/0x180 [ 1665.478548] ? __vm_enough_memory+0x316/0x650 [ 1665.483041] shmem_alloc_and_acct_page+0x15a/0x850 [ 1665.488039] shmem_getpage_gfp+0x4e9/0x37f0 [ 1665.492368] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1665.497465] ? mark_held_locks+0xa6/0xf0 [ 1665.501520] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1665.506727] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1665.511922] shmem_write_begin+0xff/0x1e0 [ 1665.516083] generic_perform_write+0x1f8/0x4d0 [ 1665.520670] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1665.525343] ? current_time+0x1c0/0x1c0 [ 1665.529318] ? lock_acquire+0x170/0x3c0 [ 1665.533298] __generic_file_write_iter+0x24b/0x610 [ 1665.538221] generic_file_write_iter+0x3f8/0x730 [ 1665.542974] __vfs_write+0x51b/0x770 [ 1665.546695] ? kernel_read+0x110/0x110 [ 1665.550576] ? check_preemption_disabled+0x41/0x280 [ 1665.555682] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1665.560696] vfs_write+0x1f3/0x540 [ 1665.564225] __x64_sys_pwrite64+0x1f7/0x250 [ 1665.568529] ? ksys_pwrite64+0x1a0/0x1a0 [ 1665.572575] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1665.577599] ? do_syscall_64+0x21/0x620 [ 1665.581563] do_syscall_64+0xf9/0x620 [ 1665.585367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1665.590541] RIP: 0033:0x419777 [ 1665.593714] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1665.612730] RSP: 002b:00007fab52535f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1665.620469] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1665.627739] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 08:55:14 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1665.635089] RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffffffffffff [ 1665.642358] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 1665.649782] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 1665.682607] EXT4-fs (loop4): unsupported descriptor size 0 08:55:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000001}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 1665.740707] EXT4-fs error (device loop5): ext4_fill_super:4443: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1665.754692] EXT4-fs (loop5): get root inode failed [ 1665.761489] EXT4-fs (loop5): mount failed 08:55:14 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1665.881197] FAULT_INJECTION: forcing a failure. [ 1665.881197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1665.893482] CPU: 0 PID: 25962 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1665.901511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1665.910865] Call Trace: [ 1665.913471] dump_stack+0x1fc/0x2ef [ 1665.917114] should_fail.cold+0xa/0xf [ 1665.920922] ? lock_acquire+0x170/0x3c0 [ 1665.924883] ? setup_fault_attr+0x200/0x200 [ 1665.929220] __alloc_pages_nodemask+0x239/0x2890 [ 1665.933976] ? __lock_acquire+0x6de/0x3ff0 [ 1665.938222] ? __lock_acquire+0x6de/0x3ff0 [ 1665.942453] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1665.947285] ? __lock_acquire+0x6de/0x3ff0 [ 1665.951526] ? radix_tree_node_alloc.constprop.0+0x1b8/0x320 [ 1665.957339] ? mark_held_locks+0xf0/0xf0 [ 1665.961421] alloc_pages_vma+0xf2/0x780 [ 1665.965394] shmem_alloc_page+0x11c/0x1f0 [ 1665.969547] ? shmem_swapin+0x220/0x220 [ 1665.973528] ? percpu_counter_add_batch+0x126/0x180 [ 1665.978991] ? __vm_enough_memory+0x316/0x650 [ 1665.983488] shmem_alloc_and_acct_page+0x15a/0x850 [ 1665.988425] shmem_getpage_gfp+0x4e9/0x37f0 [ 1665.992768] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1665.997877] ? mark_held_locks+0xa6/0xf0 [ 1666.001932] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1666.007122] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1666.012306] shmem_write_begin+0xff/0x1e0 [ 1666.016464] generic_perform_write+0x1f8/0x4d0 [ 1666.021051] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1666.025714] ? current_time+0x1c0/0x1c0 [ 1666.029703] ? lock_acquire+0x170/0x3c0 [ 1666.033687] __generic_file_write_iter+0x24b/0x610 [ 1666.038616] generic_file_write_iter+0x3f8/0x730 [ 1666.043378] __vfs_write+0x51b/0x770 [ 1666.047194] ? kernel_read+0x110/0x110 [ 1666.051116] ? check_preemption_disabled+0x41/0x280 [ 1666.056143] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1666.061159] vfs_write+0x1f3/0x540 [ 1666.064709] __x64_sys_pwrite64+0x1f7/0x250 [ 1666.069207] ? ksys_pwrite64+0x1a0/0x1a0 [ 1666.073267] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1666.078295] ? do_syscall_64+0x21/0x620 [ 1666.082257] do_syscall_64+0xf9/0x620 [ 1666.086075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1666.091345] RIP: 0033:0x419777 [ 1666.094529] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1666.113837] RSP: 002b:00007fab52535f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1666.121544] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1666.128846] RDX: 0000000000000015 RSI: 0000000020013900 RDI: 0000000000000004 [ 1666.136238] RBP: 0000000000000008 R08: 0000000000000000 R09: ffffffffffffffff [ 1666.143932] R10: 0000000000030000 R11: 0000000000000293 R12: 0000000000000004 [ 1666.151197] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 1666.194153] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1666.200335] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1666.243793] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1666.259137] EXT4-fs (loop5): mount failed 08:55:17 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xc9d6b9b0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180), 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x9, 0x8, 0x9, 0x0, 0x9f4, 0x201, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0x4000, 0x28, 0x9, 0x9, 0x2cc, 0x4, 0x8000, 0x0, 0x10000, 0x0, 0x401}, 0xffffffffffffffff, 0x6, r1, 0x8) 08:55:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4, &(0x7f0000000500)="f47970da"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:17 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1668.346011] FAULT_INJECTION: forcing a failure. [ 1668.346011] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.379933] CPU: 1 PID: 26000 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1668.381411] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1668.387854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1668.387861] Call Trace: [ 1668.387884] dump_stack+0x1fc/0x2ef [ 1668.387905] should_fail.cold+0xa/0xf [ 1668.387924] ? setup_fault_attr+0x200/0x200 [ 1668.387939] ? lock_acquire+0x170/0x3c0 [ 1668.387957] __should_failslab+0x115/0x180 [ 1668.387971] should_failslab+0x5/0x10 [ 1668.387987] kmem_cache_alloc+0x277/0x370 [ 1668.388006] getname_flags+0xce/0x590 [ 1668.388025] do_sys_open+0x26c/0x520 08:55:17 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:17 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1668.388037] ? filp_open+0x70/0x70 [ 1668.388053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1668.388069] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1668.388083] ? do_syscall_64+0x21/0x620 [ 1668.388100] do_syscall_64+0xf9/0x620 [ 1668.388118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.388129] RIP: 0033:0x4196c4 [ 1668.388143] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1668.388151] RSP: 002b:00007fab52535ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1668.388164] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1668.388173] RDX: 0000000000000002 RSI: 00007fab52536000 RDI: 00000000ffffff9c [ 1668.388182] RBP: 00007fab52536000 R08: 0000000000000000 R09: ffffffffffffffff [ 1668.388190] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1668.388198] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1668.423574] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:55:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1668.596585] FAULT_INJECTION: forcing a failure. [ 1668.596585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1668.609033] CPU: 1 PID: 26013 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1668.616921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1668.626339] Call Trace: [ 1668.628931] dump_stack+0x1fc/0x2ef [ 1668.632631] should_fail.cold+0xa/0xf [ 1668.636449] ? setup_fault_attr+0x200/0x200 [ 1668.640875] ? do_writepages+0x290/0x290 08:55:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10, &(0x7f0000000340)=[{&(0x7f00000000c0)="5d69ea31addfbfce235079225a80664308931ceef29475b1d79dda9f7bacccd3026503c38d989ffc9c5aa6fb896e94006390db3a7261eca811ca94385e3bf2348c90556c7cad57da9bff020234bb94c5994403a684cf28373a504e50455ec35ba980a4dd6a27b9578fb6a8b38da060004380ba1a6595baa379213415ce64e3d2a734a6fa", 0x84}, {&(0x7f00000002c0)="6db4c69e34eb22cff10f4aee2615010900bd0af2dd5d9105f68cc464af8e9d1ae5f06393a9e4d6daad3b0564a7d5f80ed24ca0fab2bd38632f50434915c9ed3631a563950a4a9622581f90df88289dfab6e7ca4570a1eb91edac95aeb4cdacf27a2b1a7fef12f77dc6c2e9528ab067c1f4b01e2bc93a7d0b22691caeae3cf2", 0x7f}, {&(0x7f0000000480)="bceec3d7cfd2660df15f4fc72b3c79073b16e38c51ca56a7a367d874cc69bc2c871ba6976d85ba46af3da0904f97dc1d844df64c5f14b9fb3f8443a42603df19186156d335ba7f092743202b631b3bca7b088eda972c5e943d782b4e58b3290e3d20164dec9223bca5553f2f9e6801fad0071c069ac5c33c015ffb37dbe0de79a42a0fc1d7d13f7f0c695005c868e04abd33ad60a7f929948283e6d66aa3488e20004e55d618966fd038448387c865463c52ab5c0e51e6e6371e8234bcfcda190daa8d9c6d3ae0b19b9edaf71794ab09c5ba04f175b25c51e4d5c3201160cb9ed327168e90ad819cbef57421cf", 0xed}, {&(0x7f0000000580)="41dc75a306cdb234e0c8a27cb248fdc9d6b6c09ac227521aca32b9bdfac4e148a3aace1804236fbcbada5bb2bce0203eea520c0a77b24677548851bc7c5e89557ca43ccde094abddd88c0ceecda1ce189f6398d8a8b435eaf084e89a4193cedde49cd36d7fb918e9f358f0ffeb313e8b449d620f41db34f2b12b6bbfc30a8ac6e8dd9cc319c09489bf68e2d7cf9b045ca1cc918a9b9a2853183bd15d2384f1a90ddc884ab30c5dcfd479e6fe5ca203e04cbf6768f56d936e982807b5ffa1de99dd7145ac1831c11614ada26b3ddf57", 0xcf}, {&(0x7f0000001780)="e04cbd0e9567a0528417ef6076fc4e2379f1803fe1155795054376854972a7f9a626c166c1a6400bebc529111ed691b184a893873945006e84123bb4aa8262eac14b7db408b899889e9b8b84949dc48873f9fef2779663dffba6f32b6945deadf5643b5d42ff9b4202f8ac72c8ea835bf3f79b645fdb250856fdaff68aa4d46bb7334ba756942f623c74b0c151ec43689e15e4ca1d52999fc0db0757808acba874a23fe5c7094842201b3c64397aa22729b3d99882d85a89a03728803611e18e740949d30744c660f9326eacb989aa9718f19f559668d75be0f860029d0a0a64b0be0533168412f5a44a19976c7fe8db", 0xf0}, {&(0x7f0000001880)="5402d0e6c376606828af1cb9f4be323e3ced676c53dd41d43fda27240bf67a11804b96c69c8960f8cdd91a275de451c2bfbeee7ea79bcdab57cf07a5555a4d20eafb442927e2556972a03fd7e0065bc12af60a7d44f10bdaa0fbe7d40e47cf9d649a40d61cbd5a97669ea1485125e033dea313353dd7133b9f342f00e39f6a1697ae27d55f63145978119c119ae984a51c011dd19a", 0x95}], 0x6, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010101, @rand_addr=0x64010101}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x45}}], 0x38}, 0x20064800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) r3 = fanotify_init(0x12, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000780)={{r3}, 0x0, 0x6, @inherit={0x80, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000000000007000000000000007f000000000000001f000000000000000000000b00000000f8ffffffffffffff7f0000000000000007000000000000000800000000000000000000800000000000000000000001007f030000000000000900000000000000020000000000000046090000000000000400000000000000269895d187"]}, @subvolid=0x10000}) [ 1668.645040] ? unlock_page+0x13d/0x230 [ 1668.648958] __alloc_pages_nodemask+0x239/0x2890 [ 1668.653816] ? generic_perform_write+0x36c/0x4d0 [ 1668.658598] ? __lock_acquire+0x6de/0x3ff0 [ 1668.662848] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1668.667751] ? lock_downgrade+0x720/0x720 [ 1668.671970] ? lock_acquire+0x170/0x3c0 [ 1668.675931] ? up_write+0x18/0x150 [ 1668.679457] ? generic_file_write_iter+0x381/0x730 [ 1668.684374] cache_grow_begin+0xa4/0x8a0 [ 1668.688447] ? setup_fault_attr+0x200/0x200 [ 1668.693797] ? lock_acquire+0x170/0x3c0 [ 1668.697866] cache_alloc_refill+0x273/0x340 [ 1668.702195] kmem_cache_alloc+0x346/0x370 [ 1668.706331] getname_flags+0xce/0x590 [ 1668.710141] do_sys_open+0x26c/0x520 [ 1668.713895] ? filp_open+0x70/0x70 [ 1668.717427] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1668.722957] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1668.727988] ? do_syscall_64+0x21/0x620 [ 1668.732553] do_syscall_64+0xf9/0x620 [ 1668.736350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.741555] RIP: 0033:0x4196c4 [ 1668.744745] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1668.764573] RSP: 002b:00007fab52535ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1668.772310] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1668.779564] RDX: 0000000000000002 RSI: 00007fab52536000 RDI: 00000000ffffff9c [ 1668.786817] RBP: 00007fab52536000 R08: 0000000000000000 R09: ffffffffffffffff 08:55:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:17 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1668.794079] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1668.801358] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x50f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x3, 0x3, 0x4, 0x1, 0x1000}}) [ 1668.879951] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1668.883077] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1668.930534] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1668.937516] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1668.952717] EXT4-fs (loop5): mount failed [ 1669.883664] ieee802154 phy0 wpan0: encryption failed: -22 08:55:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4, &(0x7f0000000500)="f47970da"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 08:55:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:20 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:20 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1671.324710] FAULT_INJECTION: forcing a failure. [ 1671.324710] name failslab, interval 1, probability 0, space 0, times 0 [ 1671.343926] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1671.352469] CPU: 1 PID: 26069 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1671.360383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.369847] Call Trace: [ 1671.372452] dump_stack+0x1fc/0x2ef [ 1671.376102] should_fail.cold+0xa/0xf [ 1671.379926] ? setup_fault_attr+0x200/0x200 [ 1671.384261] ? lock_acquire+0x170/0x3c0 [ 1671.388252] __should_failslab+0x115/0x180 [ 1671.392499] should_failslab+0x5/0x10 [ 1671.396487] kmem_cache_alloc+0x277/0x370 [ 1671.401199] __alloc_file+0x21/0x330 [ 1671.404915] alloc_empty_file+0x6d/0x170 [ 1671.408975] path_openat+0xe9/0x2df0 [ 1671.412691] ? __lock_acquire+0x6de/0x3ff0 [ 1671.416925] ? path_lookupat+0x8d0/0x8d0 [ 1671.420984] ? mark_held_locks+0xf0/0xf0 [ 1671.425045] do_filp_open+0x18c/0x3f0 [ 1671.428855] ? may_open_dev+0xf0/0xf0 [ 1671.432664] ? __alloc_fd+0x28d/0x570 [ 1671.436463] ? lock_downgrade+0x720/0x720 [ 1671.440593] ? lock_acquire+0x170/0x3c0 [ 1671.444563] ? __alloc_fd+0x34/0x570 [ 1671.448274] ? do_raw_spin_unlock+0x171/0x230 [ 1671.452771] ? _raw_spin_unlock+0x29/0x40 [ 1671.456923] ? __alloc_fd+0x28d/0x570 [ 1671.460722] do_sys_open+0x3b3/0x520 [ 1671.464437] ? filp_open+0x70/0x70 [ 1671.467987] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1671.473358] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1671.478379] ? do_syscall_64+0x21/0x620 [ 1671.482359] do_syscall_64+0xf9/0x620 [ 1671.486167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.491418] RIP: 0033:0x4196c4 [ 1671.494666] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1671.513552] RSP: 002b:00007fab52535ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 08:55:20 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1671.521688] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1671.528957] RDX: 0000000000000002 RSI: 00007fab52536000 RDI: 00000000ffffff9c [ 1671.536373] RBP: 00007fab52536000 R08: 0000000000000000 R09: ffffffffffffffff [ 1671.543647] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1671.550918] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ed}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:20 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1671.579801] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 08:55:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:20 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1671.735303] FAULT_INJECTION: forcing a failure. [ 1671.735303] name failslab, interval 1, probability 0, space 0, times 0 [ 1671.747108] CPU: 1 PID: 26105 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1671.755003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.764365] Call Trace: [ 1671.766967] dump_stack+0x1fc/0x2ef [ 1671.770611] should_fail.cold+0xa/0xf [ 1671.774407] ? setup_fault_attr+0x200/0x200 [ 1671.778722] ? lock_acquire+0x170/0x3c0 [ 1671.782689] __should_failslab+0x115/0x180 [ 1671.786913] should_failslab+0x5/0x10 [ 1671.790699] kmem_cache_alloc_trace+0x284/0x380 [ 1671.795358] apparmor_file_alloc_security+0x394/0xad0 [ 1671.800541] ? apparmor_file_receive+0x160/0x160 [ 1671.805300] ? __alloc_file+0x21/0x330 [ 1671.809282] security_file_alloc+0x40/0x90 [ 1671.813508] __alloc_file+0xc9/0x330 [ 1671.817221] alloc_empty_file+0x6d/0x170 [ 1671.821316] path_openat+0xe9/0x2df0 [ 1671.825050] ? __lock_acquire+0x6de/0x3ff0 [ 1671.829285] ? path_lookupat+0x8d0/0x8d0 [ 1671.833338] ? mark_held_locks+0xf0/0xf0 [ 1671.837388] ? io_schedule_timeout+0x140/0x140 [ 1671.841962] do_filp_open+0x18c/0x3f0 [ 1671.845750] ? may_open_dev+0xf0/0xf0 [ 1671.849544] ? __alloc_fd+0x28d/0x570 [ 1671.853335] ? lock_downgrade+0x720/0x720 [ 1671.857467] ? lock_acquire+0x170/0x3c0 [ 1671.861544] ? __alloc_fd+0x34/0x570 [ 1671.865254] ? do_raw_spin_unlock+0x171/0x230 [ 1671.869744] ? _raw_spin_unlock+0x29/0x40 [ 1671.873897] ? __alloc_fd+0x28d/0x570 [ 1671.877694] do_sys_open+0x3b3/0x520 [ 1671.881410] ? filp_open+0x70/0x70 [ 1671.884953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1671.890307] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1671.895324] ? do_syscall_64+0x21/0x620 [ 1671.899287] do_syscall_64+0xf9/0x620 [ 1671.903081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.908259] RIP: 0033:0x4196c4 [ 1671.911443] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1671.930428] RSP: 002b:00007fab52535ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1671.938142] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1671.945401] RDX: 0000000000000002 RSI: 00007fab52536000 RDI: 00000000ffffff9c [ 1671.952671] RBP: 00007fab52536000 R08: 0000000000000000 R09: ffffffffffffffff [ 1671.959926] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1671.967180] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1671.987954] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1671.999590] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 08:55:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4, &(0x7f0000000500)="f47970da"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x8000000000000, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) lseek(r2, 0x0, 0x1) 08:55:23 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:23 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1674.373255] FAULT_INJECTION: forcing a failure. [ 1674.373255] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.408388] CPU: 1 PID: 26133 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1674.416314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.425673] Call Trace: [ 1674.428279] dump_stack+0x1fc/0x2ef [ 1674.431928] should_fail.cold+0xa/0xf [ 1674.435733] ? setup_fault_attr+0x200/0x200 [ 1674.440144] ? lock_acquire+0x170/0x3c0 [ 1674.444108] __should_failslab+0x115/0x180 [ 1674.448331] should_failslab+0x5/0x10 [ 1674.452115] kmem_cache_alloc_trace+0x284/0x380 [ 1674.456770] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1674.461563] __kthread_create_on_node+0xd2/0x410 [ 1674.466384] ? kthread_parkme+0xa0/0xa0 [ 1674.470508] ? lo_ioctl+0x1bb/0x20e0 [ 1674.474223] ? __mutex_lock+0x365/0x1200 [ 1674.478357] ? lock_downgrade+0x720/0x720 [ 1674.482492] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1674.487231] kthread_create_on_node+0xbb/0xf0 [ 1674.491730] ? __kthread_create_on_node+0x410/0x410 [ 1674.496732] ? __fget+0x356/0x510 [ 1674.500193] ? do_dup2+0x450/0x450 [ 1674.503721] ? __lockdep_init_map+0x100/0x5a0 [ 1674.508201] ? __lockdep_init_map+0x100/0x5a0 [ 1674.513420] lo_ioctl+0xae5/0x20e0 [ 1674.516957] ? loop_set_status64+0x110/0x110 [ 1674.521413] blkdev_ioctl+0x5cb/0x1a80 [ 1674.525302] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.530655] ? blkpg_ioctl+0x9d0/0x9d0 [ 1674.534582] ? mark_held_locks+0xf0/0xf0 [ 1674.538636] ? mark_held_locks+0xf0/0xf0 [ 1674.542692] ? debug_check_no_obj_freed+0x201/0x490 [ 1674.547705] ? lock_downgrade+0x720/0x720 [ 1674.551851] block_ioctl+0xe9/0x130 [ 1674.555463] ? blkdev_fallocate+0x3f0/0x3f0 [ 1674.559769] do_vfs_ioctl+0xcdb/0x12e0 [ 1674.563644] ? lock_downgrade+0x720/0x720 [ 1674.567794] ? check_preemption_disabled+0x41/0x280 [ 1674.572793] ? ioctl_preallocate+0x200/0x200 [ 1674.577186] ? __fget+0x356/0x510 [ 1674.580654] ? do_dup2+0x450/0x450 [ 1674.584186] ? do_sys_open+0x2bf/0x520 [ 1674.588062] ksys_ioctl+0x9b/0xc0 [ 1674.591679] __x64_sys_ioctl+0x6f/0xb0 [ 1674.595561] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1674.600142] do_syscall_64+0xf9/0x620 [ 1674.604020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.609196] RIP: 0033:0x466397 [ 1674.612377] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.631314] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1674.639031] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1674.646293] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1674.653556] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1674.660934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:55:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1674.668215] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:23 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1674.721901] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1674.743116] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 08:55:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:23 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000005b80), 0x1, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000005bc0)=[{}, {}], &(0x7f0000005c00)=0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x30170, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x550, 0x0, @perf_bp={0x0}, 0x13402}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x279083138e2f01c1, 0x11, r1, 0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:23 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffff1f00, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1674.917034] FAULT_INJECTION: forcing a failure. [ 1674.917034] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.934695] CPU: 0 PID: 26168 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1674.942606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.951957] Call Trace: [ 1674.954591] dump_stack+0x1fc/0x2ef [ 1674.958206] should_fail.cold+0xa/0xf [ 1674.961993] ? setup_fault_attr+0x200/0x200 [ 1674.966296] ? lock_acquire+0x170/0x3c0 [ 1674.970255] __should_failslab+0x115/0x180 [ 1674.974473] should_failslab+0x5/0x10 [ 1674.978269] kmem_cache_alloc+0x277/0x370 [ 1674.982416] __kernfs_new_node+0xd2/0x680 [ 1674.986550] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1674.991288] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1674.995776] ? __cpu_to_node+0x7b/0xa0 [ 1674.999661] ? mark_held_locks+0xf0/0xf0 [ 1675.003883] ? io_schedule_timeout+0x140/0x140 [ 1675.008550] ? enqueue_entity+0xf86/0x3850 [ 1675.012837] ? set_user_nice.part.0+0x3b9/0xab0 [ 1675.017560] kernfs_create_dir_ns+0x9e/0x230 [ 1675.021980] internal_create_group+0x1c1/0xb20 [ 1675.026556] ? sysfs_remove_link_from_group+0x70/0x70 [ 1675.031730] ? lock_downgrade+0x720/0x720 [ 1675.035877] lo_ioctl+0xf7c/0x20e0 [ 1675.039415] ? loop_set_status64+0x110/0x110 [ 1675.043823] blkdev_ioctl+0x5cb/0x1a80 [ 1675.047697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.053054] ? blkpg_ioctl+0x9d0/0x9d0 [ 1675.056926] ? mark_held_locks+0xf0/0xf0 [ 1675.060983] ? mark_held_locks+0xf0/0xf0 [ 1675.065034] ? debug_check_no_obj_freed+0x201/0x490 [ 1675.070034] ? lock_downgrade+0x720/0x720 [ 1675.074162] block_ioctl+0xe9/0x130 [ 1675.077782] ? blkdev_fallocate+0x3f0/0x3f0 [ 1675.082097] do_vfs_ioctl+0xcdb/0x12e0 [ 1675.085974] ? lock_downgrade+0x720/0x720 [ 1675.090105] ? check_preemption_disabled+0x41/0x280 [ 1675.095114] ? ioctl_preallocate+0x200/0x200 [ 1675.099611] ? __fget+0x356/0x510 [ 1675.103055] ? do_dup2+0x450/0x450 [ 1675.106577] ? do_sys_open+0x2bf/0x520 [ 1675.110468] ksys_ioctl+0x9b/0xc0 [ 1675.114007] __x64_sys_ioctl+0x6f/0xb0 [ 1675.117885] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1675.123009] do_syscall_64+0xf9/0x620 [ 1675.126904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.132077] RIP: 0033:0x466397 [ 1675.135253] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.154137] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1675.161848] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1675.169106] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1675.176360] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1675.183617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1675.190968] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1675.214988] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1675.232166] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1675.244415] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1675.261550] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1675.296027] EXT4-fs (loop5): mount failed 08:55:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:26 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x408080, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:26 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:26 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1677.411217] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1677.420664] FAULT_INJECTION: forcing a failure. [ 1677.420664] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.433486] CPU: 1 PID: 26205 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1677.441384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1677.450746] Call Trace: [ 1677.453787] dump_stack+0x1fc/0x2ef [ 1677.457437] should_fail.cold+0xa/0xf [ 1677.461334] ? setup_fault_attr+0x200/0x200 [ 1677.465657] ? lock_acquire+0x170/0x3c0 [ 1677.469906] __should_failslab+0x115/0x180 [ 1677.474161] should_failslab+0x5/0x10 [ 1677.477984] kmem_cache_alloc+0x277/0x370 [ 1677.482139] __kernfs_new_node+0xd2/0x680 [ 1677.486281] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1677.491069] ? kernfs_activate+0x2c/0x1d0 [ 1677.495205] ? lock_downgrade+0x720/0x720 [ 1677.499347] ? kernfs_add_one+0x51/0x4c0 [ 1677.503411] ? mutex_trylock+0x1a0/0x1a0 [ 1677.507484] ? __mutex_unlock_slowpath+0xea/0x610 [ 1677.512532] kernfs_new_node+0x92/0x120 [ 1677.516496] __kernfs_create_file+0x51/0x340 [ 1677.520915] sysfs_add_file_mode_ns+0x226/0x540 [ 1677.525589] internal_create_group+0x355/0xb20 [ 1677.530176] ? sysfs_remove_link_from_group+0x70/0x70 [ 1677.535360] ? lock_downgrade+0x720/0x720 [ 1677.539514] lo_ioctl+0xf7c/0x20e0 [ 1677.543113] ? loop_set_status64+0x110/0x110 [ 1677.547515] blkdev_ioctl+0x5cb/0x1a80 [ 1677.551387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.556760] ? blkpg_ioctl+0x9d0/0x9d0 [ 1677.560644] ? mark_held_locks+0xf0/0xf0 [ 1677.564700] ? mark_held_locks+0xf0/0xf0 [ 1677.568761] ? debug_check_no_obj_freed+0x201/0x490 [ 1677.573850] ? lock_downgrade+0x720/0x720 [ 1677.577994] block_ioctl+0xe9/0x130 [ 1677.581631] ? blkdev_fallocate+0x3f0/0x3f0 [ 1677.585952] do_vfs_ioctl+0xcdb/0x12e0 [ 1677.589837] ? lock_downgrade+0x720/0x720 [ 1677.593976] ? check_preemption_disabled+0x41/0x280 [ 1677.599155] ? ioctl_preallocate+0x200/0x200 [ 1677.603747] ? __fget+0x356/0x510 [ 1677.607204] ? do_dup2+0x450/0x450 [ 1677.610735] ? do_sys_open+0x2bf/0x520 [ 1677.614612] ksys_ioctl+0x9b/0xc0 [ 1677.618071] __x64_sys_ioctl+0x6f/0xb0 [ 1677.622056] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1677.626653] do_syscall_64+0xf9/0x620 [ 1677.630484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1677.635690] RIP: 0033:0x466397 [ 1677.638970] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:55:26 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r0, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1677.657868] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1677.665612] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1677.672878] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1677.680133] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1677.687493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1677.694746] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:26 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x3, 0x2, 0x1ff, 0x0, 0x7}}) [ 1677.745202] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1677.757600] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1677.772571] EXT4-fs (loop5): mount failed 08:55:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:26 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1677.827030] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 08:55:26 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1677.966556] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1678.036486] FAULT_INJECTION: forcing a failure. [ 1678.036486] name failslab, interval 1, probability 0, space 0, times 0 [ 1678.048420] CPU: 0 PID: 26251 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1678.056295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1678.065638] Call Trace: [ 1678.068225] dump_stack+0x1fc/0x2ef [ 1678.071842] should_fail.cold+0xa/0xf [ 1678.075645] ? setup_fault_attr+0x200/0x200 [ 1678.079946] ? lock_acquire+0x170/0x3c0 [ 1678.083906] __should_failslab+0x115/0x180 [ 1678.088126] should_failslab+0x5/0x10 [ 1678.091911] kmem_cache_alloc+0x277/0x370 [ 1678.096044] __kernfs_new_node+0xd2/0x680 [ 1678.100177] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1678.104915] ? __mutex_unlock_slowpath+0xea/0x610 [ 1678.109757] ? wait_for_completion_io+0x10/0x10 [ 1678.114414] ? kernfs_next_descendant_post+0x19c/0x290 [ 1678.119682] kernfs_new_node+0x92/0x120 [ 1678.123642] __kernfs_create_file+0x51/0x340 [ 1678.128081] sysfs_add_file_mode_ns+0x226/0x540 [ 1678.132744] internal_create_group+0x355/0xb20 [ 1678.137327] ? sysfs_remove_link_from_group+0x70/0x70 [ 1678.142508] ? lock_downgrade+0x720/0x720 [ 1678.146656] lo_ioctl+0xf7c/0x20e0 [ 1678.150212] ? loop_set_status64+0x110/0x110 [ 1678.154619] blkdev_ioctl+0x5cb/0x1a80 [ 1678.158506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1678.163939] ? blkpg_ioctl+0x9d0/0x9d0 [ 1678.167812] ? mark_held_locks+0xf0/0xf0 [ 1678.171863] ? mark_held_locks+0xf0/0xf0 [ 1678.175914] ? debug_check_no_obj_freed+0x201/0x490 [ 1678.180950] ? lock_downgrade+0x720/0x720 [ 1678.185081] block_ioctl+0xe9/0x130 [ 1678.188689] ? blkdev_fallocate+0x3f0/0x3f0 [ 1678.192992] do_vfs_ioctl+0xcdb/0x12e0 [ 1678.196864] ? lock_downgrade+0x720/0x720 [ 1678.200992] ? check_preemption_disabled+0x41/0x280 [ 1678.206001] ? ioctl_preallocate+0x200/0x200 [ 1678.210392] ? __fget+0x356/0x510 [ 1678.213830] ? do_dup2+0x450/0x450 [ 1678.217354] ? do_sys_open+0x2bf/0x520 [ 1678.221224] ksys_ioctl+0x9b/0xc0 [ 1678.224660] __x64_sys_ioctl+0x6f/0xb0 [ 1678.228538] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1678.233130] do_syscall_64+0xf9/0x620 [ 1678.236939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1678.242130] RIP: 0033:0x466397 [ 1678.245309] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1678.264287] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1678.271991] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1678.279267] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1678.286523] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1678.293779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1678.301045] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1678.324221] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1678.408895] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1678.420503] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1678.434898] EXT4-fs (loop5): mount failed 08:55:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:29 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf31a, 0x2}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:29 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:29 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1680.447520] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1680.453972] FAULT_INJECTION: forcing a failure. [ 1680.453972] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.475327] CPU: 1 PID: 26279 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1680.483409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1680.492770] Call Trace: [ 1680.495373] dump_stack+0x1fc/0x2ef [ 1680.499891] should_fail.cold+0xa/0xf [ 1680.503697] ? setup_fault_attr+0x200/0x200 [ 1680.508015] ? lock_acquire+0x170/0x3c0 [ 1680.512100] __should_failslab+0x115/0x180 [ 1680.516345] should_failslab+0x5/0x10 [ 1680.520259] kmem_cache_alloc+0x277/0x370 [ 1680.524416] __kernfs_new_node+0xd2/0x680 [ 1680.528556] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1680.533313] ? __mutex_unlock_slowpath+0xea/0x610 [ 1680.538152] ? wait_for_completion_io+0x10/0x10 [ 1680.542839] ? kernfs_next_descendant_post+0x19c/0x290 [ 1680.548124] kernfs_new_node+0x92/0x120 [ 1680.552110] __kernfs_create_file+0x51/0x340 [ 1680.556515] sysfs_add_file_mode_ns+0x226/0x540 [ 1680.561169] internal_create_group+0x355/0xb20 [ 1680.565739] ? sysfs_remove_link_from_group+0x70/0x70 [ 1680.570928] ? lock_downgrade+0x720/0x720 [ 1680.575075] lo_ioctl+0xf7c/0x20e0 [ 1680.578614] ? loop_set_status64+0x110/0x110 [ 1680.583115] blkdev_ioctl+0x5cb/0x1a80 [ 1680.587084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1680.592533] ? blkpg_ioctl+0x9d0/0x9d0 [ 1680.596423] ? mark_held_locks+0xf0/0xf0 [ 1680.600558] ? mark_held_locks+0xf0/0xf0 [ 1680.604610] ? debug_check_no_obj_freed+0x201/0x490 [ 1680.610867] ? lock_downgrade+0x720/0x720 [ 1680.615012] block_ioctl+0xe9/0x130 [ 1680.618633] ? blkdev_fallocate+0x3f0/0x3f0 [ 1680.622975] do_vfs_ioctl+0xcdb/0x12e0 [ 1680.626880] ? lock_downgrade+0x720/0x720 [ 1680.631021] ? check_preemption_disabled+0x41/0x280 [ 1680.636047] ? ioctl_preallocate+0x200/0x200 [ 1680.640545] ? __fget+0x356/0x510 [ 1680.644002] ? do_dup2+0x450/0x450 [ 1680.647582] ? do_sys_open+0x2bf/0x520 [ 1680.651467] ksys_ioctl+0x9b/0xc0 [ 1680.654951] __x64_sys_ioctl+0x6f/0xb0 [ 1680.658836] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1680.663413] do_syscall_64+0xf9/0x620 [ 1680.667297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1680.672508] RIP: 0033:0x466397 [ 1680.675888] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:55:29 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1680.694871] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1680.702578] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1680.709853] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1680.717269] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1680.724626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1680.731914] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1680.771208] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1680.788589] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1680.800712] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:55:29 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x10000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1680.820519] EXT4-fs (loop5): mount failed 08:55:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:29 executing program 3: mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb5) acct(&(0x7f00000000c0)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) unlink(&(0x7f0000000140)='./file0\x00') acct(0x0) r2 = gettid() open$dir(0x0, 0x82, 0x0) timer_create(0x2, &(0x7f0000000100)={0x0, 0x30, 0x0, @thr={&(0x7f0000000780)="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", &(0x7f0000000080)="5e73ea8825a8000864f579db28fb"}}, &(0x7f0000000180)) tkill(r2, 0x1000000000016) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:30 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1681.055522] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1681.114593] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1681.210079] Process accounting resumed [ 1681.214417] Process accounting resumed 08:55:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:32 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:32 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:32 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0xfffffd03, 0xfffffffffffffffe, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r0, 0x0) sendto$inet6(r1, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7, 0x0, 0x4, 0x3, 0x0, 0x6, 0x82000, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xffffffffffffff81, 0x5}, 0x100, 0x6, 0x85, 0x5, 0x9, 0xfffffe00, 0x7, 0x0, 0x100, 0x0, 0x6}, 0xffffffffffffffff, 0xe, r0, 0x0) sendto$inet6(r2, &(0x7f0000000100)="8e4abe64c9a58bbdd002b7ad2267e772d86c04eb4a324e90eec7b10aeae45d82b60f7cacb9aa905e861ef9aab9d7c70c8d0e2f939cf865d5a868f82c3627674c8912a5c3390ed818b02f7a0226503b5fbd3fa40e33315cf6b2366d11f86902767a902d553c607778599088c94683961745cac9812185877f6102ad4029e23a3c34e58da742b3ce4293fc8d15f1702fa11c2807e5b72b8e9d4211b729c46c19abb8d3c850b9a92c313357e12d3e4bd4", 0xaf, 0x20048810, &(0x7f0000000200)={0xa, 0x4e22, 0x100, @mcast2, 0x80000000}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000240)=@fragment={0x3a, 0x0, 0x0, 0x1, 0x0, 0xa, 0x65}, 0x8) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:32 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x210000, 0x0) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) dup(r1) [ 1683.562157] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1683.570148] FAULT_INJECTION: forcing a failure. [ 1683.570148] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.582151] CPU: 1 PID: 26360 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1683.590228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1683.599602] Call Trace: [ 1683.602397] dump_stack+0x1fc/0x2ef [ 1683.606049] should_fail.cold+0xa/0xf [ 1683.609856] ? setup_fault_attr+0x200/0x200 [ 1683.614173] ? lock_acquire+0x170/0x3c0 [ 1683.618140] __should_failslab+0x115/0x180 [ 1683.622375] should_failslab+0x5/0x10 [ 1683.626169] kmem_cache_alloc+0x277/0x370 [ 1683.630326] __kernfs_new_node+0xd2/0x680 [ 1683.634487] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1683.639239] ? __mutex_unlock_slowpath+0xea/0x610 [ 1683.644082] ? wait_for_completion_io+0x10/0x10 [ 1683.648874] ? kernfs_next_descendant_post+0x19c/0x290 [ 1683.654155] kernfs_new_node+0x92/0x120 [ 1683.658126] __kernfs_create_file+0x51/0x340 [ 1683.662553] sysfs_add_file_mode_ns+0x226/0x540 [ 1683.667562] internal_create_group+0x355/0xb20 [ 1683.672150] ? sysfs_remove_link_from_group+0x70/0x70 [ 1683.677335] ? lock_downgrade+0x720/0x720 [ 1683.681492] lo_ioctl+0xf7c/0x20e0 [ 1683.685044] ? loop_set_status64+0x110/0x110 [ 1683.689469] blkdev_ioctl+0x5cb/0x1a80 [ 1683.693366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1683.698727] ? blkpg_ioctl+0x9d0/0x9d0 [ 1683.702605] ? mark_held_locks+0xf0/0xf0 [ 1683.706686] ? mark_held_locks+0xf0/0xf0 [ 1683.710780] ? debug_check_no_obj_freed+0x201/0x490 [ 1683.715793] ? lock_downgrade+0x720/0x720 [ 1683.719941] block_ioctl+0xe9/0x130 [ 1683.723574] ? blkdev_fallocate+0x3f0/0x3f0 [ 1683.727895] do_vfs_ioctl+0xcdb/0x12e0 [ 1683.731792] ? lock_downgrade+0x720/0x720 [ 1683.735942] ? check_preemption_disabled+0x41/0x280 [ 1683.741045] ? ioctl_preallocate+0x200/0x200 [ 1683.745473] ? __fget+0x356/0x510 [ 1683.748939] ? do_dup2+0x450/0x450 [ 1683.752499] ? do_sys_open+0x2bf/0x520 [ 1683.756399] ksys_ioctl+0x9b/0xc0 [ 1683.759851] __x64_sys_ioctl+0x6f/0xb0 [ 1683.763736] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1683.768311] do_syscall_64+0xf9/0x620 [ 1683.772118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1683.777334] RIP: 0033:0x466397 [ 1683.780594] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.799502] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:55:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1683.807204] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1683.814477] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1683.821817] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1683.829219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1683.836478] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1683.857418] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:55:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:32 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x7b, 0x7, 0x4, 0x0, 0x28, 0x40, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8, 0x20}, 0x2210, 0x6, 0x401, 0x0, 0x5, 0x398, 0x1f, 0x0, 0x1, 0x0, 0x24000000}, r2, 0x10, r0, 0x2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x201001, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000003c0)={{0xffffffffffffffff, 0x2, 0x2, 0x2, 0x2}}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x501000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000380)={{0x0, 0x1, 0xffff04f1, 0x3, 0x1a}}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x20, 0x6, 0x7, 0x3, 0x0, 0xf34, 0x0, 0x13, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x514, 0x1, @perf_config_ext={0x3, 0x9}, 0x8000, 0x200, 0x6, 0x6, 0x2, 0x500, 0x8, 0x0, 0x3, 0x0, 0xff}, 0xffffffffffffffff, 0xe, r0, 0x2) 08:55:32 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1683.947935] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1683.964522] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:55:33 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0xc04, 0x6, 0x0, 0x0, 0x9, 0xfffffffe, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={[0xffffffffffffffcf]}, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3, 0x40, 0x40, 0x0, 0x0, 0x70b, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x0, 0x2}, 0x800, 0x9, 0x3e44, 0x9, 0xce46, 0x0, 0x7, 0x0, 0xdb9, 0x0, 0xffff}, 0x0, 0xb, r1, 0x2) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1684.032037] EXT4-fs (loop0): invalid first ino: 0 [ 1684.050700] EXT4-fs (loop5): mount failed [ 1684.151188] EXT4-fs (loop4): invalid first ino: 0 08:55:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:33 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1684.302795] EXT4-fs (loop0): invalid first ino: 0 [ 1684.347650] FAULT_INJECTION: forcing a failure. [ 1684.347650] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.359295] CPU: 1 PID: 26411 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1684.367270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.376702] Call Trace: [ 1684.379289] dump_stack+0x1fc/0x2ef [ 1684.383385] should_fail.cold+0xa/0xf [ 1684.387327] ? setup_fault_attr+0x200/0x200 [ 1684.391646] ? lock_acquire+0x170/0x3c0 [ 1684.395616] __should_failslab+0x115/0x180 [ 1684.399931] should_failslab+0x5/0x10 [ 1684.403818] kmem_cache_alloc+0x277/0x370 [ 1684.408372] __kernfs_new_node+0xd2/0x680 [ 1684.412536] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1684.417713] ? __mutex_unlock_slowpath+0xea/0x610 [ 1684.422580] ? wait_for_completion_io+0x10/0x10 [ 1684.427706] ? kernfs_next_descendant_post+0x19c/0x290 [ 1684.432994] kernfs_new_node+0x92/0x120 [ 1684.437077] __kernfs_create_file+0x51/0x340 [ 1684.441504] sysfs_add_file_mode_ns+0x226/0x540 [ 1684.446261] internal_create_group+0x355/0xb20 [ 1684.450840] ? sysfs_remove_link_from_group+0x70/0x70 [ 1684.456019] ? lock_downgrade+0x720/0x720 [ 1684.460162] lo_ioctl+0xf7c/0x20e0 [ 1684.463797] ? loop_set_status64+0x110/0x110 [ 1684.468224] blkdev_ioctl+0x5cb/0x1a80 [ 1684.472132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1684.477664] ? blkpg_ioctl+0x9d0/0x9d0 [ 1684.481558] ? mark_held_locks+0xf0/0xf0 [ 1684.485640] ? mark_held_locks+0xf0/0xf0 [ 1684.489689] ? debug_check_no_obj_freed+0x201/0x490 [ 1684.494710] ? lock_downgrade+0x720/0x720 [ 1684.503369] block_ioctl+0xe9/0x130 [ 1684.507190] ? blkdev_fallocate+0x3f0/0x3f0 [ 1684.511686] do_vfs_ioctl+0xcdb/0x12e0 [ 1684.515599] ? lock_downgrade+0x720/0x720 [ 1684.519740] ? check_preemption_disabled+0x41/0x280 [ 1684.524752] ? ioctl_preallocate+0x200/0x200 [ 1684.529169] ? __fget+0x356/0x510 [ 1684.532626] ? do_dup2+0x450/0x450 [ 1684.536180] ? do_sys_open+0x2bf/0x520 [ 1684.540171] ksys_ioctl+0x9b/0xc0 [ 1684.543628] __x64_sys_ioctl+0x6f/0xb0 [ 1684.547511] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1684.552092] do_syscall_64+0xf9/0x620 [ 1684.555900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1684.561239] RIP: 0033:0x466397 [ 1684.564440] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.583348] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1684.591068] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1684.598423] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1684.605689] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1684.613141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1684.620406] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1684.687758] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1684.698325] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1684.712516] EXT4-fs (loop5): mount failed 08:55:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x7, &(0x7f0000000500)="f47970da7c2fd5"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:35 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x3, 0x0, 0x3, 0x1, 0xbbca}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 08:55:35 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:35 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:35 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r0, 0x0) sendto$inet6(r1, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14, 0x80000) recvmmsg(r3, &(0x7f0000000f40)=[{{&(0x7f00000000c0)=@caif=@util, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/119, 0x77}, 0x6}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000001180)=""/219, 0xdb}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000001080)=""/238, 0xee}], 0x4, &(0x7f0000000540)=""/252, 0xfc}, 0x10000}, {{&(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000780)=""/193, 0xc1}, {&(0x7f0000000880)=""/83, 0x53}, {&(0x7f0000000900)=""/242, 0xf2}], 0x3, &(0x7f0000000a00)=""/181, 0xb5}, 0xffffc952}, {{&(0x7f0000000b00)=@rc, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000b80)=""/158, 0x9e}, {&(0x7f0000000c40)=""/118, 0x76}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/184, 0xb8}, {&(0x7f0000000240)=""/128, 0x80}], 0x5, &(0x7f0000000ec0)=""/104, 0x68}}], 0x4, 0x102, &(0x7f0000001040)) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000080)={{0x3, 0x1, 0x101}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1686.551102] EXT4-fs (loop0): invalid first ino: 0 [ 1686.557577] EXT4-fs (loop4): invalid first ino: 0 [ 1686.580173] FAULT_INJECTION: forcing a failure. [ 1686.580173] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.597296] CPU: 0 PID: 26445 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1686.605231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.614591] Call Trace: [ 1686.617182] dump_stack+0x1fc/0x2ef [ 1686.620825] should_fail.cold+0xa/0xf [ 1686.624634] ? setup_fault_attr+0x200/0x200 [ 1686.629063] ? lock_acquire+0x170/0x3c0 [ 1686.634177] __should_failslab+0x115/0x180 [ 1686.638456] should_failslab+0x5/0x10 [ 1686.642247] kmem_cache_alloc+0x277/0x370 [ 1686.646385] __kernfs_new_node+0xd2/0x680 [ 1686.650557] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1686.655341] ? __mutex_unlock_slowpath+0xea/0x610 [ 1686.660208] ? wait_for_completion_io+0x10/0x10 [ 1686.664892] ? kernfs_next_descendant_post+0x19c/0x290 [ 1686.670288] kernfs_new_node+0x92/0x120 [ 1686.674281] __kernfs_create_file+0x51/0x340 [ 1686.678702] sysfs_add_file_mode_ns+0x226/0x540 [ 1686.683430] internal_create_group+0x355/0xb20 [ 1686.688014] ? sysfs_remove_link_from_group+0x70/0x70 [ 1686.693198] ? lock_downgrade+0x720/0x720 [ 1686.697356] lo_ioctl+0xf7c/0x20e0 [ 1686.701078] ? loop_set_status64+0x110/0x110 [ 1686.705519] blkdev_ioctl+0x5cb/0x1a80 [ 1686.709408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1686.714767] ? blkpg_ioctl+0x9d0/0x9d0 [ 1686.718794] ? mark_held_locks+0xf0/0xf0 [ 1686.722842] ? mark_held_locks+0xf0/0xf0 [ 1686.726936] ? debug_check_no_obj_freed+0x201/0x490 [ 1686.731953] ? lock_downgrade+0x720/0x720 [ 1686.736192] block_ioctl+0xe9/0x130 [ 1686.739987] ? blkdev_fallocate+0x3f0/0x3f0 [ 1686.744295] do_vfs_ioctl+0xcdb/0x12e0 [ 1686.748174] ? lock_downgrade+0x720/0x720 [ 1686.752316] ? check_preemption_disabled+0x41/0x280 [ 1686.757337] ? ioctl_preallocate+0x200/0x200 [ 1686.761755] ? __fget+0x356/0x510 [ 1686.765208] ? do_dup2+0x450/0x450 [ 1686.768741] ? do_sys_open+0x2bf/0x520 [ 1686.772647] ksys_ioctl+0x9b/0xc0 [ 1686.776363] __x64_sys_ioctl+0x6f/0xb0 [ 1686.780336] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1686.784918] do_syscall_64+0xf9/0x620 [ 1686.788725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1686.793926] RIP: 0033:0x466397 [ 1686.797120] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1686.816019] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1686.823747] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1686.831022] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1686.838301] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1686.845565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1686.852844] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1686.909393] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1686.937817] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:55:35 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1686.960744] EXT4-fs (loop5): mount failed 08:55:35 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4090}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:36 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1687.193439] EXT4-fs (loop4): invalid first ino: 0 [ 1687.207534] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1687.265121] FAULT_INJECTION: forcing a failure. [ 1687.265121] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.279064] CPU: 0 PID: 26482 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1687.287033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.296395] Call Trace: [ 1687.298992] dump_stack+0x1fc/0x2ef [ 1687.302605] should_fail.cold+0xa/0xf [ 1687.306388] ? setup_fault_attr+0x200/0x200 [ 1687.310703] ? lock_acquire+0x170/0x3c0 [ 1687.314668] ? dev_uevent_filter+0xd0/0xd0 [ 1687.318883] __should_failslab+0x115/0x180 [ 1687.323102] should_failslab+0x5/0x10 [ 1687.326897] kmem_cache_alloc_trace+0x284/0x380 [ 1687.331549] ? dev_uevent_filter+0xd0/0xd0 [ 1687.335784] kobject_uevent_env+0x236/0x1480 [ 1687.340179] lo_ioctl+0xff9/0x20e0 [ 1687.343703] ? loop_set_status64+0x110/0x110 [ 1687.348095] blkdev_ioctl+0x5cb/0x1a80 [ 1687.351965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1687.357555] ? blkpg_ioctl+0x9d0/0x9d0 [ 1687.361455] ? mark_held_locks+0xf0/0xf0 [ 1687.365508] ? mark_held_locks+0xf0/0xf0 [ 1687.369554] ? debug_check_no_obj_freed+0x201/0x490 [ 1687.374566] ? lock_downgrade+0x720/0x720 [ 1687.378694] block_ioctl+0xe9/0x130 [ 1687.382303] ? blkdev_fallocate+0x3f0/0x3f0 [ 1687.386607] do_vfs_ioctl+0xcdb/0x12e0 [ 1687.390473] ? lock_downgrade+0x720/0x720 [ 1687.394612] ? check_preemption_disabled+0x41/0x280 [ 1687.399973] ? ioctl_preallocate+0x200/0x200 [ 1687.404730] ? __fget+0x356/0x510 [ 1687.408195] ? do_dup2+0x450/0x450 [ 1687.411714] ? do_sys_open+0x2bf/0x520 [ 1687.415670] ksys_ioctl+0x9b/0xc0 [ 1687.419103] __x64_sys_ioctl+0x6f/0xb0 [ 1687.423224] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1687.427897] do_syscall_64+0xf9/0x620 [ 1687.431700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1687.437001] RIP: 0033:0x466397 [ 1687.440176] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.460017] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1687.467787] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1687.475049] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1687.482319] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1687.489572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1687.496907] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1687.565874] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1687.576369] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1687.602447] EXT4-fs (loop5): mount failed 08:55:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x7, &(0x7f0000000500)="f47970da7c2fd5"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x12080, 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:38 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:38 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x11c, 0x14000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r2 = syz_open_dev$audion(&(0x7f0000000080), 0x7, 0x40000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x1, 0x2, 0x9, 0x3, 0x4}}) [ 1689.614804] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 08:55:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1689.682855] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1689.685514] FAULT_INJECTION: forcing a failure. [ 1689.685514] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.706462] CPU: 0 PID: 26517 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1689.714565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.724304] Call Trace: [ 1689.726975] dump_stack+0x1fc/0x2ef [ 1689.730592] should_fail.cold+0xa/0xf [ 1689.734385] ? setup_fault_attr+0x200/0x200 [ 1689.738774] ? lock_acquire+0x170/0x3c0 [ 1689.742741] __should_failslab+0x115/0x180 [ 1689.746981] should_failslab+0x5/0x10 [ 1689.750765] __kmalloc+0x2ab/0x3c0 [ 1689.754463] ? kobject_get_path+0xbf/0x240 [ 1689.758737] kobject_get_path+0xbf/0x240 [ 1689.762784] kobject_uevent_env+0x25c/0x1480 [ 1689.767196] lo_ioctl+0xff9/0x20e0 [ 1689.770807] ? loop_set_status64+0x110/0x110 [ 1689.775247] blkdev_ioctl+0x5cb/0x1a80 [ 1689.779128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.784479] ? blkpg_ioctl+0x9d0/0x9d0 [ 1689.788349] ? mark_held_locks+0xf0/0xf0 [ 1689.792408] ? mark_held_locks+0xf0/0xf0 [ 1689.796466] ? debug_check_no_obj_freed+0x201/0x490 [ 1689.801664] ? lock_downgrade+0x720/0x720 [ 1689.805823] block_ioctl+0xe9/0x130 [ 1689.809468] ? blkdev_fallocate+0x3f0/0x3f0 [ 1689.813837] do_vfs_ioctl+0xcdb/0x12e0 [ 1689.817957] ? lock_downgrade+0x720/0x720 [ 1689.822105] ? check_preemption_disabled+0x41/0x280 [ 1689.827124] ? ioctl_preallocate+0x200/0x200 [ 1689.831523] ? __fget+0x356/0x510 [ 1689.834962] ? do_dup2+0x450/0x450 [ 1689.838493] ? do_sys_open+0x2bf/0x520 [ 1689.842509] ksys_ioctl+0x9b/0xc0 [ 1689.846003] __x64_sys_ioctl+0x6f/0xb0 [ 1689.849884] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1689.854454] do_syscall_64+0xf9/0x620 [ 1689.858252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.863427] RIP: 0033:0x466397 [ 1689.866795] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.885687] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1689.893497] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1689.901305] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1689.908653] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1689.915909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1689.923165] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r3, 0x0) sendto$inet6(r4, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r3, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000080)={0x2}) 08:55:39 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1690.009162] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1690.019722] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1690.036077] EXT4-fs (loop5): mount failed 08:55:39 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x12, 0x3, 0x1, 0x0, 0x93, 0x8007, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x18, 0xffffffffffffff5d, 0x10001, 0x6, 0x4, 0x1, 0x0, 0x0, 0x1f, 0x0, 0x6}, r0, 0x10, 0xffffffffffffffff, 0x9) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) wait4(r4, &(0x7f00000000c0), 0x2, &(0x7f0000000200)) r5 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r5, 0x12) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000100)={0x0, 0xb6, 0xfffffffc, 0x0, 0x8ab783cdc338a7ba}) [ 1690.170151] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1690.254493] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 08:55:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x7, &(0x7f0000000500)="f47970da7c2fd5"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:41 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x8}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 08:55:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:41 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffff, 0x67aa}, 0x0, 0x1c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x884f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x3, 0x1, 0x1, 0xad4d9f3ec9a50f76, 0x800}) [ 1692.606945] FAULT_INJECTION: forcing a failure. [ 1692.606945] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.628862] CPU: 0 PID: 26587 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1692.636825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.646192] Call Trace: [ 1692.648787] dump_stack+0x1fc/0x2ef [ 1692.652410] should_fail.cold+0xa/0xf [ 1692.656331] ? setup_fault_attr+0x200/0x200 [ 1692.660643] ? lock_acquire+0x170/0x3c0 [ 1692.664615] __should_failslab+0x115/0x180 [ 1692.668836] should_failslab+0x5/0x10 [ 1692.672625] __kmalloc+0x2ab/0x3c0 [ 1692.676152] ? kobject_get_path+0xbf/0x240 [ 1692.680394] kobject_get_path+0xbf/0x240 [ 1692.684462] kobject_uevent_env+0x25c/0x1480 [ 1692.688888] lo_ioctl+0xff9/0x20e0 [ 1692.692462] ? loop_set_status64+0x110/0x110 [ 1692.696857] blkdev_ioctl+0x5cb/0x1a80 [ 1692.700762] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.706108] ? blkpg_ioctl+0x9d0/0x9d0 [ 1692.709978] ? mark_held_locks+0xf0/0xf0 [ 1692.714025] ? mark_held_locks+0xf0/0xf0 [ 1692.718085] ? debug_check_no_obj_freed+0x201/0x490 [ 1692.723185] ? lock_downgrade+0x720/0x720 [ 1692.727319] block_ioctl+0xe9/0x130 [ 1692.730950] ? blkdev_fallocate+0x3f0/0x3f0 [ 1692.735263] do_vfs_ioctl+0xcdb/0x12e0 [ 1692.739227] ? lock_downgrade+0x720/0x720 [ 1692.743371] ? check_preemption_disabled+0x41/0x280 [ 1692.748373] ? ioctl_preallocate+0x200/0x200 [ 1692.752770] ? __fget+0x356/0x510 [ 1692.756210] ? do_dup2+0x450/0x450 [ 1692.759766] ? do_sys_open+0x2bf/0x520 [ 1692.763660] ksys_ioctl+0x9b/0xc0 [ 1692.767098] __x64_sys_ioctl+0x6f/0xb0 [ 1692.770969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1692.775583] do_syscall_64+0xf9/0x620 [ 1692.779372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.784573] RIP: 0033:0x466397 [ 1692.787769] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1692.806783] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1692.814516] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1692.821819] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1692.829178] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1692.836448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1692.843814] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1692.891327] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1692.902810] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1692.911092] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1692.922576] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:55:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r2, 0x0, &(0x7f0000000180)) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) openat(r0, &(0x7f0000000080)='./file0\x00', 0x4040, 0xf) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1692.969824] EXT4-fs (loop5): mount failed 08:55:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:42 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3, 0x2, 0x7, 0x3, 0xfd}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x3, 0x0, 0x1}}) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 08:55:42 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1693.134914] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1693.156480] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 08:55:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:44 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:44 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x520, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x4, 0x81, 0x7f, 0x0, 0x0, 0x93b40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x4, 0x1f}, 0x0, 0x80, 0x8, 0x9, 0x5, 0x8, 0x7, 0x0, 0xfffffff9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0xe) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r3, 0x0) sendto$inet6(r4, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r3, r4, 0x0) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:44 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:44 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x1, 0x0, 0xcdb5, 0x0, 0x4}}) signalfd4(r0, &(0x7f0000000000)={[0x1]}, 0x8, 0x80000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x31}}) [ 1695.695896] FAULT_INJECTION: forcing a failure. [ 1695.695896] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.724878] CPU: 0 PID: 26674 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1695.732793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.742189] Call Trace: [ 1695.744775] dump_stack+0x1fc/0x2ef [ 1695.748438] should_fail.cold+0xa/0xf [ 1695.752506] ? setup_fault_attr+0x200/0x200 [ 1695.756817] ? lock_acquire+0x170/0x3c0 [ 1695.760791] __should_failslab+0x115/0x180 [ 1695.765031] should_failslab+0x5/0x10 [ 1695.768830] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1695.773965] __kmalloc_node_track_caller+0x38/0x70 [ 1695.779164] __alloc_skb+0xae/0x560 [ 1695.782794] alloc_uevent_skb+0x7b/0x210 [ 1695.786946] kobject_uevent_env+0xa90/0x1480 [ 1695.791363] lo_ioctl+0xff9/0x20e0 [ 1695.794896] ? loop_set_status64+0x110/0x110 [ 1695.799312] blkdev_ioctl+0x5cb/0x1a80 [ 1695.803206] ? blkpg_ioctl+0x9d0/0x9d0 [ 1695.807079] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1695.811646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1695.816391] ? retint_kernel+0x2d/0x2d [ 1695.820268] block_ioctl+0xe9/0x130 [ 1695.823878] ? blkdev_fallocate+0x3f0/0x3f0 [ 1695.828184] do_vfs_ioctl+0xcdb/0x12e0 [ 1695.832058] ? lock_downgrade+0x720/0x720 [ 1695.836191] ? check_preemption_disabled+0x41/0x280 [ 1695.841295] ? ioctl_preallocate+0x200/0x200 [ 1695.845713] ? __fget+0x356/0x510 [ 1695.849151] ? do_dup2+0x450/0x450 [ 1695.852675] ? do_sys_open+0x2bf/0x520 [ 1695.856546] ksys_ioctl+0x9b/0xc0 [ 1695.859989] __x64_sys_ioctl+0x6f/0xb0 [ 1695.863859] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1695.868426] do_syscall_64+0xf9/0x620 [ 1695.872228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1695.877405] RIP: 0033:0x466397 [ 1695.880596] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.899831] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1695.907531] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1695.914793] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1695.922063] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1695.929342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1695.936601] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1695.947755] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 08:55:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1696.005099] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1696.041159] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 08:55:45 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in6=@ipv4={""/10, ""/2, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@RTM_GETMDB={0x18, 0x56, 0x20, 0x70bd2a, 0x25dfdbfd, {0x7, r1}, ["", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1696.059618] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1696.075658] EXT4-fs (loop5): mount failed 08:55:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:45 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:45 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1696.186844] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1696.326862] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1696.385369] FAULT_INJECTION: forcing a failure. [ 1696.385369] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.396870] CPU: 0 PID: 26728 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1696.404780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.414229] Call Trace: [ 1696.416825] dump_stack+0x1fc/0x2ef [ 1696.420466] should_fail.cold+0xa/0xf [ 1696.424262] ? setup_fault_attr+0x200/0x200 [ 1696.428573] ? lock_acquire+0x170/0x3c0 [ 1696.433018] __should_failslab+0x115/0x180 [ 1696.437340] should_failslab+0x5/0x10 [ 1696.441148] kmem_cache_alloc+0x277/0x370 [ 1696.445297] skb_clone+0x151/0x3d0 [ 1696.448827] netlink_broadcast_filtered+0x8e5/0xbc0 [ 1696.453970] netlink_broadcast+0x35/0x40 [ 1696.458020] kobject_uevent_env+0xa56/0x1480 [ 1696.462431] lo_ioctl+0xff9/0x20e0 [ 1696.465961] ? loop_set_status64+0x110/0x110 [ 1696.470356] blkdev_ioctl+0x5cb/0x1a80 [ 1696.474232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1696.479576] ? blkpg_ioctl+0x9d0/0x9d0 [ 1696.483701] ? mark_held_locks+0xf0/0xf0 [ 1696.487762] ? mark_held_locks+0xf0/0xf0 [ 1696.491882] ? debug_check_no_obj_freed+0x201/0x490 [ 1696.496939] ? lock_downgrade+0x720/0x720 [ 1696.501103] block_ioctl+0xe9/0x130 [ 1696.504768] ? blkdev_fallocate+0x3f0/0x3f0 [ 1696.509079] do_vfs_ioctl+0xcdb/0x12e0 [ 1696.513146] ? lock_downgrade+0x720/0x720 [ 1696.517311] ? check_preemption_disabled+0x41/0x280 [ 1696.522327] ? ioctl_preallocate+0x200/0x200 [ 1696.526849] ? __fget+0x356/0x510 [ 1696.530390] ? do_dup2+0x450/0x450 [ 1696.533932] ? do_sys_open+0x2bf/0x520 [ 1696.537824] ksys_ioctl+0x9b/0xc0 [ 1696.541307] __x64_sys_ioctl+0x6f/0xb0 [ 1696.545312] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1696.549899] do_syscall_64+0xf9/0x620 [ 1696.553704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1696.558892] RIP: 0033:0x466397 [ 1696.562086] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.582534] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1696.590243] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1696.597503] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1696.604872] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1696.612147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1696.619407] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 1696.688952] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1696.709622] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1696.733176] EXT4-fs (loop5): mount failed 08:55:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:47 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x110, 0x800, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c3b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x646800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x1f, 0x0, 0x4}}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x5, 0x2, 0x9dd6}}) 08:55:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:47 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:47 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1698.679190] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1698.736084] FAULT_INJECTION: forcing a failure. [ 1698.736084] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.748894] CPU: 0 PID: 26756 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1698.756836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1698.766293] Call Trace: [ 1698.766317] dump_stack+0x1fc/0x2ef [ 1698.766338] should_fail.cold+0xa/0xf [ 1698.776331] ? setup_fault_attr+0x200/0x200 [ 1698.780663] ? lock_acquire+0x170/0x3c0 [ 1698.784659] __should_failslab+0x115/0x180 [ 1698.789297] should_failslab+0x5/0x10 [ 1698.793200] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1698.798312] __kmalloc_node_track_caller+0x38/0x70 [ 1698.803331] __alloc_skb+0xae/0x560 [ 1698.806952] alloc_uevent_skb+0x7b/0x210 [ 1698.811024] kobject_uevent_env+0xa90/0x1480 [ 1698.815665] lo_ioctl+0xff9/0x20e0 [ 1698.819227] ? loop_set_status64+0x110/0x110 [ 1698.823745] blkdev_ioctl+0x5cb/0x1a80 [ 1698.827679] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1698.833234] ? blkpg_ioctl+0x9d0/0x9d0 [ 1698.837446] ? mark_held_locks+0xf0/0xf0 [ 1698.841592] ? mark_held_locks+0xf0/0xf0 [ 1698.845644] ? debug_check_no_obj_freed+0x201/0x490 [ 1698.850802] ? lock_downgrade+0x720/0x720 [ 1698.854954] block_ioctl+0xe9/0x130 [ 1698.858569] ? blkdev_fallocate+0x3f0/0x3f0 [ 1698.862881] do_vfs_ioctl+0xcdb/0x12e0 [ 1698.866761] ? lock_downgrade+0x720/0x720 [ 1698.871281] ? check_preemption_disabled+0x41/0x280 [ 1698.876316] ? ioctl_preallocate+0x200/0x200 [ 1698.881231] ? __fget+0x356/0x510 [ 1698.884770] ? do_dup2+0x450/0x450 [ 1698.888305] ? do_sys_open+0x2bf/0x520 [ 1698.892194] ksys_ioctl+0x9b/0xc0 [ 1698.895683] __x64_sys_ioctl+0x6f/0xb0 [ 1698.899614] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1698.904188] do_syscall_64+0xf9/0x620 [ 1698.908003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1698.913266] RIP: 0033:0x466397 [ 1698.916451] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:55:47 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) r2 = dup2(r1, r0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x2000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x3, 0x3, 0x7, 0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000140)) [ 1698.935868] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1698.943623] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1698.950923] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1698.958198] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1698.965459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1698.972758] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1699.032934] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1699.046052] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 08:55:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:48 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1699.116999] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1699.132443] EXT4-fs (loop5): mount failed 08:55:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:48 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1699.251565] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1699.264484] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 08:55:48 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r0, 0x0) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000100)) sendto$inet6(r1, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r0, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x1}, 0x380, 0x0, 0x0, 0x3, 0x0, 0x200000}, 0x0, 0x0, r0, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1699.352561] FAULT_INJECTION: forcing a failure. [ 1699.352561] name failslab, interval 1, probability 0, space 0, times 0 [ 1699.376243] CPU: 1 PID: 26819 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1699.384933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1699.394366] Call Trace: [ 1699.396945] dump_stack+0x1fc/0x2ef [ 1699.400628] should_fail.cold+0xa/0xf [ 1699.404424] ? setup_fault_attr+0x200/0x200 [ 1699.408753] ? lock_acquire+0x170/0x3c0 [ 1699.413265] __should_failslab+0x115/0x180 [ 1699.417513] should_failslab+0x5/0x10 [ 1699.421436] kmem_cache_alloc_trace+0x284/0x380 [ 1699.426140] ? wait_for_completion_io+0x10/0x10 [ 1699.430802] ? kobj_ns_initial+0x90/0x90 [ 1699.434868] call_usermodehelper_setup+0x84/0x300 [ 1699.439706] kobject_uevent_env+0xe83/0x1480 [ 1699.444222] lo_ioctl+0xff9/0x20e0 [ 1699.447779] ? loop_set_status64+0x110/0x110 [ 1699.452196] blkdev_ioctl+0x5cb/0x1a80 [ 1699.456217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1699.461576] ? blkpg_ioctl+0x9d0/0x9d0 [ 1699.465801] ? mark_held_locks+0xf0/0xf0 [ 1699.470170] ? mark_held_locks+0xf0/0xf0 [ 1699.474254] ? debug_check_no_obj_freed+0x201/0x490 [ 1699.479299] ? lock_downgrade+0x720/0x720 [ 1699.483445] block_ioctl+0xe9/0x130 [ 1699.487058] ? blkdev_fallocate+0x3f0/0x3f0 [ 1699.491373] do_vfs_ioctl+0xcdb/0x12e0 [ 1699.495265] ? lock_downgrade+0x720/0x720 [ 1699.499412] ? check_preemption_disabled+0x41/0x280 [ 1699.504847] ? ioctl_preallocate+0x200/0x200 [ 1699.509253] ? __fget+0x356/0x510 [ 1699.513005] ? do_dup2+0x450/0x450 [ 1699.517300] ? do_sys_open+0x2bf/0x520 [ 1699.521192] ksys_ioctl+0x9b/0xc0 [ 1699.525135] __x64_sys_ioctl+0x6f/0xb0 [ 1699.529525] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1699.534103] do_syscall_64+0xf9/0x620 [ 1699.538126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1699.543956] RIP: 0033:0x466397 [ 1699.547399] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1699.567253] RSP: 002b:00007fab52535f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1699.575158] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 1699.582559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1699.589997] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 08:55:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1699.597407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1699.604671] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 08:55:48 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1699.645235] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1699.668395] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1699.707593] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1699.724379] EXT4-fs (loop5): mount failed [ 1699.850210] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) 08:55:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:50 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) dup(r0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x26}) getsockopt$inet6_buf(r3, 0x29, 0xfc, &(0x7f0000000780)=""/4096, &(0x7f0000000200)=0x1000) sendfile(r0, r2, &(0x7f0000000080)=0x80, 0x400) r4 = syz_open_dev$audion(&(0x7f0000000240), 0x90000000000, 0x1) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000280)={0x3}, 0x4) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xd, &(0x7f0000000100)=""/123, &(0x7f0000000180)=0x7b) 08:55:50 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:50 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:51 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0xd6e78000) r1 = inotify_init1(0x80000) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480), 0x2c0840, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r5, 0x12) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r7, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r7, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r6, 0x0) sendto$inet6(r7, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r6, r7, 0x0) io_submit(0x0, 0x6, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f00000000c0)="9e9be629b9f8a34984710e9e38eeb8fa336a6f49836fcd7004a016d625e02b4186462d93e17a", 0x26, 0x7fff}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000180)="9b315e539f987bec8a15333cf7dbd846754143fcba8dfdb89db5c779cf19ee5f0c3a4a1ceb5188e5a8d584329709779fd5edba6d5fa6f901417ecbe7e480f0e791517f395d72f5adcf377c7fa02efd9685e3efdcbe8aa97c92de5f5291d7236c845c6c535d279a5eabd6c17224e1485c1f75396023c0622363cd46a0276f2330b7fc884b9ce3cfe040a6c397b85d7778305ab3971109b3bf83642cf0c8e325101f1a02fa830a918f293d0b3f122d9729ba347de9b2d96e6d042816a64a205a6417c38c5769b87551e1bd0031acd7e176fd8c8e79c42ceab202acd798d89cdb19488ce392", 0xe4, 0x6, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="74708c7824bec2acae5ba74296bf6a525192cf96d49e1634a7e6d1af9dc363f721edcfb06c729d233bd90c792cb3b3ef341e759087ad7596e2ffceb784ba17f20d519cf1fd4cc49ba606689da77e520df32be46102b8545300f0cf1548df4795a287d290bc5cd09def1f96c5eca62e5afae2f1bac56bd2f777ef8e41ced8fc0ab8988117360c9ab8b48afa3dc84890c9d55f30b4708ba6fe3c95c915d9f39537aa800c3b0c84b3ebb53d462a3d6d3807fa8ee8904b65e44177", 0xb9, 0x2, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1f, r2, &(0x7f0000000400)="1efd6f2d31c1092465958c245b076b1e0655ce47a436cf64e43af6797e9f3638342a854eb0f0058359eaa1a6335856892de900c394a13bb5ecd2734d7fb12ee1931b023c4a1fe18c732d2b216b908b4360777dd0a1ac5d57226b1f12ace6a067d7a982fa459de43f88311c9bda9f", 0x6e, 0x3ff, 0x0, 0x0, r3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x757, r0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x59, r6, &(0x7f0000000580)="ba5687188235cd05cae9495b21fcb253468019cea34868d4789f0b35de104e5fca7fe9379d30ae4a99f38200471fc62a980f5d08d19d3676bdc47e6343e6bc71dfdee91747320d590265ec4e769a6cebe64ef4d4f68c6742421f4d750f0276dfe3611a9e16eb397aba586fc41cfeeb359a42f01e5e653aaa396295e7bec8a852b67a3d295c6b027c4245b0cb40292ac3997dc54e452fa01f66a72f674a1d40d8793c44d0f54e21e9140f1844ed5ea9263a92b684dff1189f298693c95e", 0xbd, 0x5}]) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1702.083456] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1702.099707] FAULT_INJECTION: forcing a failure. [ 1702.099707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1702.111663] CPU: 0 PID: 26870 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1702.119574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.129019] Call Trace: [ 1702.131846] dump_stack+0x1fc/0x2ef [ 1702.135582] should_fail.cold+0xa/0xf [ 1702.139387] ? setup_fault_attr+0x200/0x200 [ 1702.143803] ? wake_up_q+0x93/0xe0 [ 1702.147769] ? __mutex_unlock_slowpath+0x2be/0x610 [ 1702.152833] __alloc_pages_nodemask+0x239/0x2890 [ 1702.157607] ? __lock_acquire+0x6de/0x3ff0 [ 1702.161848] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1702.166825] ? blkdev_ioctl+0x11a/0x1a80 [ 1702.170935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1702.176752] ? blkpg_ioctl+0x9d0/0x9d0 [ 1702.180634] ? debug_check_no_obj_freed+0x201/0x490 [ 1702.185660] ? lock_downgrade+0x720/0x720 [ 1702.189839] cache_grow_begin+0xa4/0x8a0 [ 1702.193911] ? setup_fault_attr+0x200/0x200 [ 1702.198229] ? lock_acquire+0x170/0x3c0 [ 1702.202220] cache_alloc_refill+0x273/0x340 [ 1702.206536] kmem_cache_alloc+0x346/0x370 [ 1702.210678] getname_flags+0xce/0x590 [ 1702.214492] do_mkdirat+0x8d/0x2d0 [ 1702.218023] ? __ia32_sys_mknod+0x120/0x120 [ 1702.222342] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1702.227814] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1702.233100] ? do_syscall_64+0x21/0x620 [ 1702.237080] do_syscall_64+0xf9/0x620 [ 1702.241468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1702.246807] RIP: 0033:0x4656e7 [ 1702.250016] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.269161] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1702.276974] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1702.284341] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1702.291628] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1702.298923] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1702.306210] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:55:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1702.353884] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 1702.379331] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 08:55:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1702.395442] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1702.422237] EXT4-fs (loop5): mount failed 08:55:51 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f0000000080)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x9, 0xe0, 0x74, 0x2, 0x0, 0xb180, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x49, 0x4, @perf_config_ext={0x10000, 0x8}, 0x0, 0x6ec, 0x9, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0xbb6f}, r4, 0x3, r5, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:55:51 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1702.535575] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 08:55:51 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1702.640663] EXT4-fs (loop0): fragment/cluster size (65536) != block size (4096) [ 1702.665903] FAULT_INJECTION: forcing a failure. [ 1702.665903] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.678444] CPU: 0 PID: 26925 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1702.686622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.695983] Call Trace: [ 1702.696009] dump_stack+0x1fc/0x2ef [ 1702.696030] should_fail.cold+0xa/0xf [ 1702.696049] ? setup_fault_attr+0x200/0x200 [ 1702.696070] __should_failslab+0x115/0x180 [ 1702.696085] should_failslab+0x5/0x10 [ 1702.696104] kmem_cache_alloc+0x277/0x370 [ 1702.723520] ? ext4_sync_fs+0x8d0/0x8d0 [ 1702.727485] ext4_alloc_inode+0x1a/0x630 [ 1702.731657] ? ext4_sync_fs+0x8d0/0x8d0 [ 1702.735628] alloc_inode+0x5d/0x180 [ 1702.739255] new_inode+0x1d/0xf0 [ 1702.742623] __ext4_new_inode+0x400/0x5a20 [ 1702.747048] ? putname+0xe1/0x120 [ 1702.750593] ? do_mkdirat+0xa0/0x2d0 [ 1702.754305] ? ext4_free_inode+0x1780/0x1780 [ 1702.758792] ? debug_check_no_obj_freed+0x201/0x490 [ 1702.763804] ? __dquot_initialize+0x298/0xb70 [ 1702.768328] ? lock_acquire+0x170/0x3c0 [ 1702.772482] ? dquot_initialize_needed+0x290/0x290 [ 1702.777433] ? trace_hardirqs_off+0x64/0x200 [ 1702.781849] ? common_perm+0x4be/0x800 [ 1702.785833] ext4_mkdir+0x396/0xe10 [ 1702.789559] ? putname+0xe1/0x120 [ 1702.793014] ? ext4_init_dot_dotdot+0x600/0x600 [ 1702.797672] ? generic_permission+0x116/0x4d0 [ 1702.802158] ? security_inode_permission+0xc5/0xf0 [ 1702.807206] ? inode_permission.part.0+0x10c/0x450 [ 1702.812145] vfs_mkdir+0x508/0x7a0 [ 1702.815780] do_mkdirat+0x262/0x2d0 [ 1702.819540] ? __ia32_sys_mknod+0x120/0x120 [ 1702.823972] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1702.828997] ? do_syscall_64+0x21/0x620 [ 1702.832989] do_syscall_64+0xf9/0x620 [ 1702.836835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1702.842051] RIP: 0033:0x4656e7 [ 1702.845235] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1702.864137] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1702.872201] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1702.879471] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1702.886728] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1702.894072] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1702.901335] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1702.950168] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 08:55:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:54 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:54 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x6, 0x2, 0x7, 0x0, 0x1}) 08:55:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1f, 0x9, 0x81, 0x9, 0x0, 0xcebd, 0x10038, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x8}, 0x80, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0xb7, 0x1, 0x0, 0x10001, 0x0, 0x2}, r1, 0xd, 0xffffffffffffffff, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1705.106728] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1705.164776] FAULT_INJECTION: forcing a failure. [ 1705.164776] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.182458] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1705.213937] CPU: 0 PID: 26965 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1705.221954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1705.232101] Call Trace: [ 1705.234701] dump_stack+0x1fc/0x2ef [ 1705.238346] should_fail.cold+0xa/0xf [ 1705.242332] ? setup_fault_attr+0x200/0x200 [ 1705.247190] ? lock_acquire+0x170/0x3c0 [ 1705.251162] __should_failslab+0x115/0x180 [ 1705.255422] should_failslab+0x5/0x10 [ 1705.259225] kmem_cache_alloc+0x277/0x370 [ 1705.263508] __d_alloc+0x2b/0xa10 [ 1705.266952] d_alloc+0x4a/0x230 [ 1705.270217] __lookup_hash+0xc8/0x180 [ 1705.274006] filename_create+0x186/0x490 [ 1705.278067] ? kern_path_mountpoint+0x40/0x40 [ 1705.282558] ? strncpy_from_user+0x2a2/0x350 [ 1705.286966] ? getname_flags+0x25b/0x590 [ 1705.291012] do_mkdirat+0xa0/0x2d0 [ 1705.294544] ? __ia32_sys_mknod+0x120/0x120 [ 1705.298871] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1705.303941] ? do_syscall_64+0x21/0x620 [ 1705.308061] do_syscall_64+0xf9/0x620 [ 1705.311975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.317166] RIP: 0033:0x4656e7 [ 1705.320664] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.339968] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1705.347896] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1705.355338] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 08:55:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1, 0x9}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1705.362600] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1705.369858] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1705.377173] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:55:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:54 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1705.592064] FAULT_INJECTION: forcing a failure. [ 1705.592064] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.606797] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1705.617723] CPU: 0 PID: 27003 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1705.625740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1705.635344] Call Trace: [ 1705.637923] dump_stack+0x1fc/0x2ef [ 1705.641551] should_fail.cold+0xa/0xf [ 1705.645415] ? setup_fault_attr+0x200/0x200 [ 1705.649781] ? __lock_acquire+0x6de/0x3ff0 [ 1705.654006] __should_failslab+0x115/0x180 [ 1705.658639] should_failslab+0x5/0x10 [ 1705.662478] __kmalloc+0x2ab/0x3c0 [ 1705.666013] ? ext4_find_extent+0x9bb/0xc70 [ 1705.670333] ext4_find_extent+0x9bb/0xc70 [ 1705.674484] ext4_ext_map_blocks+0x1c0/0x7390 [ 1705.678990] ? __lock_acquire+0x6de/0x3ff0 [ 1705.683218] ? __lock_acquire+0x6de/0x3ff0 [ 1705.687503] ? mark_held_locks+0xf0/0xf0 [ 1705.691549] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1705.696915] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1705.702115] ? mark_held_locks+0xf0/0xf0 [ 1705.706165] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1705.710995] ? ext4_es_lookup_extent+0x375/0xb60 [ 1705.715766] ? lock_downgrade+0x720/0x720 [ 1705.719906] ? lock_acquire+0x170/0x3c0 [ 1705.723870] ? check_preemption_disabled+0x41/0x280 [ 1705.728882] ? lock_acquire+0x170/0x3c0 [ 1705.732852] ? ext4_map_blocks+0x33e/0x1a50 [ 1705.737178] ext4_map_blocks+0xd88/0x1a50 [ 1705.741357] ? check_preemption_disabled+0x41/0x280 [ 1705.746365] ? ext4_issue_zeroout+0x160/0x160 [ 1705.750845] ? __brelse+0x84/0xa0 [ 1705.754297] ? __ext4_new_inode+0x2eb/0x5a20 [ 1705.758694] ext4_getblk+0xad/0x4f0 [ 1705.762309] ? ext4_iomap_begin+0xe00/0xe00 [ 1705.766634] ? ext4_free_inode+0x1780/0x1780 [ 1705.771197] ? debug_check_no_obj_freed+0x201/0x490 [ 1705.776218] ? __dquot_initialize+0x298/0xb70 [ 1705.780732] ext4_bread+0x7c/0x210 [ 1705.784276] ? ext4_getblk+0x4f0/0x4f0 [ 1705.788149] ? dquot_initialize_needed+0x290/0x290 [ 1705.793066] ? trace_hardirqs_off+0x64/0x200 [ 1705.797485] ext4_append+0x155/0x370 [ 1705.801211] ext4_mkdir+0x5bd/0xe10 [ 1705.805051] ? ext4_init_dot_dotdot+0x600/0x600 [ 1705.809833] ? generic_permission+0x116/0x4d0 [ 1705.814439] ? inode_permission.part.0+0x10c/0x450 [ 1705.819360] vfs_mkdir+0x508/0x7a0 [ 1705.822899] do_mkdirat+0x262/0x2d0 [ 1705.826532] ? __ia32_sys_mknod+0x120/0x120 [ 1705.830858] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1705.835881] ? do_syscall_64+0x21/0x620 [ 1705.839855] do_syscall_64+0xf9/0x620 [ 1705.843673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.848934] RIP: 0033:0x4656e7 [ 1705.852116] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.871193] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1705.878900] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1705.886162] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1705.893435] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1705.900697] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1705.908146] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1705.965651] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1705.990940] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1706.002978] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1706.018605] EXT4-fs (loop5): mount failed 08:55:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:55:57 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x2, 0x3, 0x32}}) 08:55:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:57 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:55:57 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1708.152142] FAULT_INJECTION: forcing a failure. [ 1708.152142] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.190619] CPU: 1 PID: 27033 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 08:55:57 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x3f, 0x7, 0x0, 0x0, 0x6, 0x6a600, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x3}, 0x1, 0x3, 0xb576, 0x5, 0x40, 0x7, 0x8ae8, 0x0, 0xfffff743, 0x0, 0x20}, 0x0, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfffffffffffeffff) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x6, 0x1, 0x8, 0x9, 0x0, 0x80000000, 0x50000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x5}, 0x10, 0x100000001, 0x5, 0x9, 0x81, 0x4, 0x8001, 0x0, 0x8, 0x0, 0xffff}, r3, 0xe, 0xffffffffffffffff, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1708.198536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1708.207890] Call Trace: [ 1708.210488] dump_stack+0x1fc/0x2ef [ 1708.214109] should_fail.cold+0xa/0xf [ 1708.217928] ? setup_fault_attr+0x200/0x200 [ 1708.222241] ? __lock_acquire+0x6de/0x3ff0 [ 1708.226535] __should_failslab+0x115/0x180 [ 1708.230785] should_failslab+0x5/0x10 [ 1708.234576] __kmalloc+0x2ab/0x3c0 [ 1708.238104] ? ext4_find_extent+0x9bb/0xc70 [ 1708.242423] ext4_find_extent+0x9bb/0xc70 [ 1708.247093] ext4_ext_map_blocks+0x1c0/0x7390 [ 1708.251679] ? __lock_acquire+0x6de/0x3ff0 [ 1708.255915] ? __lock_acquire+0x6de/0x3ff0 [ 1708.260144] ? mark_held_locks+0xf0/0xf0 [ 1708.264194] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1708.269551] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1708.274752] ? mark_held_locks+0xf0/0xf0 [ 1708.278799] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1708.283628] ? ext4_es_lookup_extent+0x375/0xb60 [ 1708.288376] ? lock_downgrade+0x720/0x720 [ 1708.292517] ? lock_acquire+0x170/0x3c0 [ 1708.296522] ? check_preemption_disabled+0x41/0x280 [ 1708.301539] ? lock_acquire+0x170/0x3c0 [ 1708.305512] ? ext4_map_blocks+0x33e/0x1a50 [ 1708.309918] ext4_map_blocks+0xd88/0x1a50 [ 1708.314073] ? check_preemption_disabled+0x41/0x280 [ 1708.319090] ? ext4_issue_zeroout+0x160/0x160 [ 1708.323582] ? __brelse+0x84/0xa0 [ 1708.327039] ? __ext4_new_inode+0x2eb/0x5a20 [ 1708.331438] ext4_getblk+0xad/0x4f0 [ 1708.335057] ? ext4_iomap_begin+0xe00/0xe00 [ 1708.339385] ? ext4_free_inode+0x1780/0x1780 [ 1708.343778] ? debug_check_no_obj_freed+0x201/0x490 [ 1708.348779] ? __dquot_initialize+0x298/0xb70 [ 1708.353261] ext4_bread+0x7c/0x210 [ 1708.356786] ? ext4_getblk+0x4f0/0x4f0 [ 1708.360661] ? dquot_initialize_needed+0x290/0x290 [ 1708.365581] ? trace_hardirqs_off+0x64/0x200 [ 1708.369989] ext4_append+0x155/0x370 [ 1708.373694] ext4_mkdir+0x5bd/0xe10 [ 1708.377413] ? ext4_init_dot_dotdot+0x600/0x600 [ 1708.382073] ? generic_permission+0x116/0x4d0 [ 1708.386553] ? inode_permission.part.0+0x10c/0x450 [ 1708.391488] vfs_mkdir+0x508/0x7a0 [ 1708.395024] do_mkdirat+0x262/0x2d0 [ 1708.398655] ? __ia32_sys_mknod+0x120/0x120 [ 1708.403069] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1708.408089] ? do_syscall_64+0x21/0x620 [ 1708.412117] do_syscall_64+0xf9/0x620 [ 1708.416004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1708.421308] RIP: 0033:0x4656e7 [ 1708.424493] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1708.443501] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1708.451219] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1708.458497] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1708.465851] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1708.473200] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1708.480458] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1708.526763] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1708.541241] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1708.542627] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1708.569084] EXT4-fs (loop5): mount failed 08:55:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, 0x0) [ 1708.573811] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:55:57 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2481, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000000c0)={0xd, 0xc96d}) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x3, 0x81, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$hfsplus(&(0x7f0000004000), &(0x7f0000004040)='./file0\x00', 0x2eb, 0x5, &(0x7f0000005300)=[{&(0x7f0000004080)="7b7e0dfb0e98663bebe18cae5aeaf338361db06dfedfc84c884f417cd976ea0284716408aab49350402276c3e92a8bbfc8867d6d8fc2951966d1c1e5c257fede8c246d755e59b5684cc54401d3f782fdc809c26032f264bd6fae70be62ac24c5a07959ef5b61cc813db627bb79f17aeb5373c7946dc62665c7", 0x79, 0x1f}, {&(0x7f0000004100)="bdafae761cbb2b9cf4ed108b4aa358e72e15b796ff15833d66f274ae19e503fc3ecaab2df4d9b4a28b919114336425ce70c204867b1db4b11b450e3edba07f6eb2bc02c4c9736ba647eaea8e0dbc8a51428c05de11d57dcf50e21a7f2ff0d4e34020415ebe8445c2d5362f0252bbfdcb74d814ee7c4385055b4a19d1601c1f196d8a9324d75c058f7ee83807298b9d9b89542d39100d8a14a494c766", 0x9c, 0x6}, {&(0x7f00000041c0)="4dd6d400e6b91293275ef9e641", 0xd, 0xff}, {&(0x7f0000004200)="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", 0x1000, 0x3f}, {&(0x7f0000005200)="bd48adf9ec35cd25581823f5af42e858f73b7513cb42d3307f45f2047988e1543230fa76b2663123eb7c3b7769ad5c40e79a62d508c84f1bccf493119fb3c2931e5efeb7ffa42d71708c56cc226f139c2f5a8ac92e1e85a22f325bedfd4902d7ebf6083a0d343f5216d089e0c247bdbffe336181c5eb572467002e16630be56563fcdd0528b84a98942a92111a7ede00ff1c12ca337b6e801e7c9ca8783564b457cc8a8a742ec8e569919e79cee60cccb11b1df7a0f1d2e7f3ef58218b9dcfd5fadf7b5ce845e65cef7c8da10b87575da01defd92e75a671a72b0a0f5b70da4c2835f83b6eecc34fa9c8e1061f86e11d94", 0xf1, 0x3f}], 0x1002, &(0x7f0000005380)={[], [{@euid_lt}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@dont_hash}, {@appraise}, {@euid_gt={'euid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/vcsa\x00'}}, {@seclabel}]}) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r3, 0x0) sendto$inet6(r4, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r3, r4, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000005400), 0x101000, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r7 = getpgid(0x0) write$cgroup_pid(r6, &(0x7f0000000140)=r7, 0x12) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005580)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000180)="4dd59b73befec7650e23e1a3fbd48ee549d791aba2a9ccfa5dc5f18b9a22d2c87ef1ac171fa7dfb402e0a46c02012eb98fed764e5c80bd32330e", 0x3a}, {&(0x7f00000001c0)="8db42bf0bced89e9d2921125e11cdc3a459d22", 0x13}], 0x2, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20, 0x48840}, {&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000300)="5f7c884db0c7c64d540919f1651626b93f4d198c8fce611e01e3433c49f60bf6596fad48f9b2b65203ccb6c57dd3e4a4cef2ee182d776c0f33b93279b7fbded3e0da5e832d3917a8", 0x48}, {&(0x7f0000000380)="b79d3975506f8d986466441fd6712e229facce906afe4c5f9944f5adcde86c047a083ff928994f8b139aca", 0x2b}, {&(0x7f00000027c0)="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", 0x1000}, {&(0x7f00000003c0)="3abba9cfc71858d7faa0ce042cc8e0d887912faee0c469e091e00e1825207491ac010660f84681cfffa2f37b3f23e1cc8c5f7d95c79e33eb11fc9b2be11c05ac80d56bde82b234e8999442d0ab7313b58a8d9b63d8ca09affcb591b8", 0x5c}], 0x4, &(0x7f00000039c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x120, 0x4}, {&(0x7f0000003b00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000003b80)="9779377e4910ecc1e25b47ad0b8b9a71fe5d2268204bfddedaeb3f", 0x1b}, {&(0x7f0000003bc0)="4ec67337412e1931dad139d8fc7749faee25582b0c4431b66ca2e54fb14c0b48495e50d69ea257dd18d5ae745324e39cc110e40a2a2f09b51bb651ae565b0554bda49c731423dfdffc188041877045be0befb79c6ea2ff9a7d0c82876d867acbd98de2c12aee6bd298984cbaf946803564b45d8ad09b92ab44881749305534a63522aef074", 0x85}, {&(0x7f0000003c80)="5182edece2c3320701e993ffebe111a00d60d257f6b2a17fe337744fbc2317c2ff1a3a8f867b2131fea55c1541c46b02d0762b0dee0a8b131c7ec58f8c6b890b674fe82aca2329c159bb2c01f0ded7391af791be0e4b2013154c3b007448", 0x5e}, {&(0x7f0000003d00)="5202987dd99beebbd9667efad1f217d48999d33bbffe3886774fda15050ae5cefa7696578307ff091c941daa70a2370b3fa2c1fd58795c59a74a22ccbfd4cb1006444677f480d320482ce1f081189462c88fc4f20300818d736a27652eb0ea3193034b0532fbadc68722a75bec0efe23ac632a1718ada508783888e5d7c5d42bced60540e96a095c8e21b9fe95a2f9ff1af7e57db00b6aac3bb0", 0x9a}], 0x4, &(0x7f0000005440)=[@rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r1]}}, @rights={{0x1c, 0x1, 0x1, [r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee01}}}], 0x108, 0x24040}], 0x3, 0x44084) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x32}}) 08:55:57 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:55:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 08:55:57 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1708.916158] FAULT_INJECTION: forcing a failure. [ 1708.916158] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.927788] CPU: 1 PID: 27094 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1708.935671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1708.945013] Call Trace: [ 1708.947715] dump_stack+0x1fc/0x2ef [ 1708.951390] should_fail.cold+0xa/0xf [ 1708.955209] ? setup_fault_attr+0x200/0x200 [ 1708.959516] ? __es_tree_search.isra.0+0x1af/0x210 [ 1708.964435] __should_failslab+0x115/0x180 [ 1708.968655] should_failslab+0x5/0x10 [ 1708.972447] kmem_cache_alloc+0x3f/0x370 [ 1708.976535] __es_insert_extent+0x39b/0x13b0 [ 1708.980934] ? lock_acquire+0x170/0x3c0 [ 1708.984895] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1708.989642] ext4_es_insert_extent+0x22e/0x5e0 [ 1708.994313] ? lock_downgrade+0x720/0x720 [ 1708.998462] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1709.004298] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1709.009302] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1709.015106] ext4_ext_map_blocks+0x2129/0x7390 [ 1709.019679] ? __lock_acquire+0x6de/0x3ff0 [ 1709.023904] ? __lock_acquire+0x6de/0x3ff0 [ 1709.028213] ? mark_held_locks+0xf0/0xf0 [ 1709.032258] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1709.037607] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1709.042799] ? mark_held_locks+0xf0/0xf0 [ 1709.046867] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1709.051825] ? ext4_es_lookup_extent+0x375/0xb60 [ 1709.056582] ? check_preemption_disabled+0x41/0x280 [ 1709.061603] ? lock_acquire+0x170/0x3c0 [ 1709.065571] ? ext4_map_blocks+0x33e/0x1a50 [ 1709.069878] ext4_map_blocks+0xd88/0x1a50 [ 1709.074108] ? check_preemption_disabled+0x41/0x280 [ 1709.079117] ? ext4_issue_zeroout+0x160/0x160 [ 1709.083600] ? __brelse+0x84/0xa0 [ 1709.087039] ? __ext4_new_inode+0x2eb/0x5a20 [ 1709.091454] ext4_getblk+0xad/0x4f0 [ 1709.095087] ? ext4_iomap_begin+0xe00/0xe00 [ 1709.099400] ? ext4_free_inode+0x1780/0x1780 [ 1709.103845] ? debug_check_no_obj_freed+0x201/0x490 [ 1709.108854] ? __dquot_initialize+0x298/0xb70 [ 1709.113373] ext4_bread+0x7c/0x210 [ 1709.116926] ? ext4_getblk+0x4f0/0x4f0 [ 1709.120805] ? dquot_initialize_needed+0x290/0x290 [ 1709.125740] ? trace_hardirqs_off+0x64/0x200 [ 1709.130136] ext4_append+0x155/0x370 [ 1709.133837] ext4_mkdir+0x5bd/0xe10 [ 1709.137451] ? ext4_init_dot_dotdot+0x600/0x600 [ 1709.142122] ? generic_permission+0x116/0x4d0 [ 1709.146611] ? inode_permission.part.0+0x10c/0x450 [ 1709.151537] vfs_mkdir+0x508/0x7a0 [ 1709.155087] do_mkdirat+0x262/0x2d0 [ 1709.158810] ? __ia32_sys_mknod+0x120/0x120 [ 1709.163133] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1709.168157] ? do_syscall_64+0x21/0x620 [ 1709.172116] do_syscall_64+0xf9/0x620 [ 1709.175902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1709.181091] RIP: 0033:0x4656e7 [ 1709.184289] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1709.203189] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1709.210906] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1709.218174] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1709.225429] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1709.232682] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1709.239935] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1709.315832] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1709.326048] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1709.340939] EXT4-fs (loop5): mount failed 08:56:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:00 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 08:56:00 executing program 3: r0 = syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x366, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000100)="103af21de89e69e8e5e08f01d478aca9d173fcb6e8db8e1ca50bc4ebb3222fbc99473eca5feeea103a79ec5007fd287115b9c394721592f16abb7c8af3888756990b736bfe2323b8677348fc1f38774d7e69e3bb190557ca41d17252bb542e2738eb3250ce9d7158b96b62a2a6d0472b8a18ea814d747c333a87c8791457ac5ffb51d60d09d7554bc8d2a12493171cd2f4bc147cc2fd", 0x96, 0x3}, {&(0x7f00000001c0)="4d91f491b3e47fb594d7c4d2fbd49e80716dc415f78fff44dca41a8ad6de30cc16f5282513cbb5f755cf946a2d60b1d7e12dd4db325e", 0x36, 0x2}, {&(0x7f0000000200)="6bc8f21c3115792256442dbc1f65d63fa54b73b1a7e69117769dc41597728d8b5d47eef98058aa5b65fbc466d1a12935d68ca62bbd32dd3b9cbfdc8b45ab184763ef3f312264546ea23ccc0aa3", 0x4d, 0x8000}, {&(0x7f0000000280)="aa7d9fc92589d66b03bc7c042984ed76279b229411c9be23b07e501bfd2c875db301eed8a6500dc7bd7d61b0e8750ad345d89f9cb344c7ac1a8d6a5f8990a0afc96ec249f67c783651194405d49b23c709133b9bb8a5761c3669a9e1adbfb146062e05a4970b345fcf6cde67d16e1a56fd2f95fac21210f3ad556d224292fffb8517a603c3b354bce6c89fe61909b3e28413b51a85faa35673a4068f032ba38f2bc188c11b3076c2", 0xa8, 0x200}, {&(0x7f0000000340)="fe2d0e0103fe65ffc21f3735546fd4f320b23504c2f690e9abd9c21c6c02c50586a23fc0e0a33aa547c39f5cbe0d7aa746eb9e9eaf47c160c31bb70ec677076e737a6e", 0x43, 0x3}], 0x10004, &(0x7f0000000600)=ANY=[@ANYBLOB="7b2b2d2d255c212624272c2f6465762f736e642f74696d6572002c2f6465762f736e642f74696d6572002c2f6465762f736e642f74696d6572002c61756469742c6673757569643d36323563373863382d9e3924632d373062642d666634362d38343930663262302c66736d616769633d3078633030303030303030303030303030302c002d10837790b552e7328e72fbe3f46d44b1eec174f3983b9b533acdb607e48ec2732fef2f2d04fd32fdf1b34008044500677999c409f65e9a3ce5b87304bd8f9b4e5cd903ae617ba9ae2024de23ce193524"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x1000) openat(r0, &(0x7f0000000500)='./file0\x00', 0x200, 0xd8) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) getsockname(r2, &(0x7f0000000440)=@nl, &(0x7f00000004c0)=0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, 0x0) 08:56:00 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1711.250010] FAULT_INJECTION: forcing a failure. [ 1711.250010] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.262756] CPU: 0 PID: 27119 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1711.270868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1711.280428] Call Trace: [ 1711.283094] dump_stack+0x1fc/0x2ef [ 1711.286795] should_fail.cold+0xa/0xf [ 1711.290606] ? setup_fault_attr+0x200/0x200 [ 1711.294911] ? lock_downgrade+0x720/0x720 [ 1711.299041] ? check_preemption_disabled+0x41/0x280 [ 1711.304042] __should_failslab+0x115/0x180 [ 1711.308380] should_failslab+0x5/0x10 [ 1711.312181] kmem_cache_alloc+0x277/0x370 [ 1711.316349] ext4_mb_new_blocks+0x60a/0x4370 [ 1711.320750] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1711.325752] ? ext4_cache_extents+0x68/0x2d0 [ 1711.330145] ? ext4_find_extent+0x9bb/0xc70 [ 1711.334687] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1711.340156] ? ext4_ext_search_right+0x2c7/0xb60 [ 1711.344916] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1711.349938] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1711.354643] ? __lock_acquire+0x6de/0x3ff0 [ 1711.358973] ? mark_held_locks+0xf0/0xf0 [ 1711.363044] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1711.368395] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1711.373588] ? mark_held_locks+0xf0/0xf0 [ 1711.377643] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1711.382470] ? ext4_es_lookup_extent+0x375/0xb60 [ 1711.387212] ? ext4_map_blocks+0x59f/0x1a50 [ 1711.391540] ext4_map_blocks+0x7a2/0x1a50 [ 1711.395696] ? check_preemption_disabled+0x41/0x280 [ 1711.400701] ? ext4_issue_zeroout+0x160/0x160 [ 1711.405194] ? __brelse+0x84/0xa0 [ 1711.408697] ? __ext4_new_inode+0x2eb/0x5a20 [ 1711.413358] ext4_getblk+0xad/0x4f0 [ 1711.416984] ? ext4_iomap_begin+0xe00/0xe00 [ 1711.421307] ? ext4_free_inode+0x1780/0x1780 [ 1711.425723] ? debug_check_no_obj_freed+0x201/0x490 [ 1711.430829] ? __dquot_initialize+0x298/0xb70 [ 1711.435736] ext4_bread+0x7c/0x210 [ 1711.439265] ? ext4_getblk+0x4f0/0x4f0 [ 1711.443262] ? dquot_initialize_needed+0x290/0x290 [ 1711.448217] ? trace_hardirqs_off+0x64/0x200 [ 1711.452730] ext4_append+0x155/0x370 [ 1711.456452] ext4_mkdir+0x5bd/0xe10 [ 1711.460170] ? ext4_init_dot_dotdot+0x600/0x600 [ 1711.464958] ? generic_permission+0x116/0x4d0 [ 1711.469453] ? inode_permission.part.0+0x10c/0x450 [ 1711.474374] vfs_mkdir+0x508/0x7a0 [ 1711.477904] do_mkdirat+0x262/0x2d0 [ 1711.481518] ? __ia32_sys_mknod+0x120/0x120 [ 1711.485853] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1711.490865] ? do_syscall_64+0x21/0x620 [ 1711.494827] do_syscall_64+0xf9/0x620 [ 1711.499494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1711.504776] RIP: 0033:0x4656e7 [ 1711.507960] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.527174] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1711.534872] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1711.542357] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1711.549870] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1711.557273] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1711.564704] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, 0x0) 08:56:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, 0x0) 08:56:00 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:00 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:00 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) dup2(r0, r2) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1711.943369] FAULT_INJECTION: forcing a failure. [ 1711.943369] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.969933] CPU: 1 PID: 27155 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1711.977992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1711.987461] Call Trace: [ 1711.990569] dump_stack+0x1fc/0x2ef [ 1711.994215] should_fail.cold+0xa/0xf [ 1711.998038] ? setup_fault_attr+0x200/0x200 [ 1712.002371] ? lock_downgrade+0x720/0x720 [ 1712.006539] ? check_preemption_disabled+0x41/0x280 [ 1712.011578] __should_failslab+0x115/0x180 [ 1712.015850] should_failslab+0x5/0x10 [ 1712.019657] kmem_cache_alloc+0x277/0x370 [ 1712.023796] ext4_mb_new_blocks+0x60a/0x4370 [ 1712.028286] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1712.033285] ? ext4_cache_extents+0x68/0x2d0 [ 1712.037677] ? ext4_find_extent+0x9bb/0xc70 [ 1712.041984] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1712.047246] ? ext4_ext_search_right+0x2c7/0xb60 [ 1712.051993] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1712.057018] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1712.061621] ? __lock_acquire+0x6de/0x3ff0 [ 1712.065848] ? mark_held_locks+0xf0/0xf0 [ 1712.069893] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1712.075358] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1712.081835] ? mark_held_locks+0xf0/0xf0 [ 1712.087446] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1712.094794] ? ext4_es_lookup_extent+0x375/0xb60 [ 1712.099536] ? ext4_map_blocks+0x59f/0x1a50 [ 1712.103856] ext4_map_blocks+0x7a2/0x1a50 [ 1712.107991] ? check_preemption_disabled+0x41/0x280 [ 1712.113095] ? ext4_issue_zeroout+0x160/0x160 [ 1712.117613] ? __brelse+0x84/0xa0 [ 1712.121114] ? __ext4_new_inode+0x2eb/0x5a20 [ 1712.125517] ext4_getblk+0xad/0x4f0 [ 1712.129136] ? ext4_iomap_begin+0xe00/0xe00 [ 1712.133445] ? ext4_free_inode+0x1780/0x1780 [ 1712.137839] ? debug_check_no_obj_freed+0x201/0x490 [ 1712.142842] ? __dquot_initialize+0x298/0xb70 [ 1712.147328] ext4_bread+0x7c/0x210 [ 1712.150856] ? ext4_getblk+0x4f0/0x4f0 [ 1712.154729] ? dquot_initialize_needed+0x290/0x290 [ 1712.159674] ? trace_hardirqs_off+0x64/0x200 [ 1712.164072] ext4_append+0x155/0x370 [ 1712.167776] ext4_mkdir+0x5bd/0xe10 [ 1712.171589] ? ext4_init_dot_dotdot+0x600/0x600 [ 1712.176248] ? generic_permission+0x116/0x4d0 [ 1712.180734] ? inode_permission.part.0+0x10c/0x450 [ 1712.185650] vfs_mkdir+0x508/0x7a0 [ 1712.189174] do_mkdirat+0x262/0x2d0 [ 1712.192787] ? __ia32_sys_mknod+0x120/0x120 [ 1712.197270] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1712.202453] ? do_syscall_64+0x21/0x620 [ 1712.206419] do_syscall_64+0xf9/0x620 [ 1712.210221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.215399] RIP: 0033:0x4656e7 [ 1712.218582] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1712.238181] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1712.245904] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1712.253276] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1712.260532] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1712.267784] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1712.275221] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:01 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0xd6e78000) r1 = inotify_init1(0x80000) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480), 0x2c0840, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r5, 0x12) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r7, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r7, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r6, 0x0) sendto$inet6(r7, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r6, r7, 0x0) io_submit(0x0, 0x6, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f00000000c0)="9e9be629b9f8a34984710e9e38eeb8fa336a6f49836fcd7004a016d625e02b4186462d93e17a", 0x26, 0x7fff}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000180)="9b315e539f987bec8a15333cf7dbd846754143fcba8dfdb89db5c779cf19ee5f0c3a4a1ceb5188e5a8d584329709779fd5edba6d5fa6f901417ecbe7e480f0e791517f395d72f5adcf377c7fa02efd9685e3efdcbe8aa97c92de5f5291d7236c845c6c535d279a5eabd6c17224e1485c1f75396023c0622363cd46a0276f2330b7fc884b9ce3cfe040a6c397b85d7778305ab3971109b3bf83642cf0c8e325101f1a02fa830a918f293d0b3f122d9729ba347de9b2d96e6d042816a64a205a6417c38c5769b87551e1bd0031acd7e176fd8c8e79c42ceab202acd798d89cdb19488ce392", 0xe4, 0x6, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="74708c7824bec2acae5ba74296bf6a525192cf96d49e1634a7e6d1af9dc363f721edcfb06c729d233bd90c792cb3b3ef341e759087ad7596e2ffceb784ba17f20d519cf1fd4cc49ba606689da77e520df32be46102b8545300f0cf1548df4795a287d290bc5cd09def1f96c5eca62e5afae2f1bac56bd2f777ef8e41ced8fc0ab8988117360c9ab8b48afa3dc84890c9d55f30b4708ba6fe3c95c915d9f39537aa800c3b0c84b3ebb53d462a3d6d3807fa8ee8904b65e44177", 0xb9, 0x2, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1f, r2, &(0x7f0000000400)="1efd6f2d31c1092465958c245b076b1e0655ce47a436cf64e43af6797e9f3638342a854eb0f0058359eaa1a6335856892de900c394a13bb5ecd2734d7fb12ee1931b023c4a1fe18c732d2b216b908b4360777dd0a1ac5d57226b1f12ace6a067d7a982fa459de43f88311c9bda9f", 0x6e, 0x3ff, 0x0, 0x0, r3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x757, r0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x59, r6, &(0x7f0000000580)="ba5687188235cd05cae9495b21fcb253468019cea34868d4789f0b35de104e5fca7fe9379d30ae4a99f38200471fc62a980f5d08d19d3676bdc47e6343e6bc71dfdee91747320d590265ec4e769a6cebe64ef4d4f68c6742421f4d750f0276dfe3611a9e16eb397aba586fc41cfeeb359a42f01e5e653aaa396295e7bec8a852b67a3d295c6b027c4245b0cb40292ac3997dc54e452fa01f66a72f674a1d40d8793c44d0f54e21e9140f1844ed5ea9263a92b684dff1189f298693c95e", 0xbd, 0x5}]) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:03 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:03 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:03 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0xd6e78000) r1 = inotify_init1(0x80000) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480), 0x2c0840, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r5, 0x12) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r7, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r7, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r6, 0x0) sendto$inet6(r7, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r6, r7, 0x0) io_submit(0x0, 0x6, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f00000000c0)="9e9be629b9f8a34984710e9e38eeb8fa336a6f49836fcd7004a016d625e02b4186462d93e17a", 0x26, 0x7fff}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000180)="9b315e539f987bec8a15333cf7dbd846754143fcba8dfdb89db5c779cf19ee5f0c3a4a1ceb5188e5a8d584329709779fd5edba6d5fa6f901417ecbe7e480f0e791517f395d72f5adcf377c7fa02efd9685e3efdcbe8aa97c92de5f5291d7236c845c6c535d279a5eabd6c17224e1485c1f75396023c0622363cd46a0276f2330b7fc884b9ce3cfe040a6c397b85d7778305ab3971109b3bf83642cf0c8e325101f1a02fa830a918f293d0b3f122d9729ba347de9b2d96e6d042816a64a205a6417c38c5769b87551e1bd0031acd7e176fd8c8e79c42ceab202acd798d89cdb19488ce392", 0xe4, 0x6, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="74708c7824bec2acae5ba74296bf6a525192cf96d49e1634a7e6d1af9dc363f721edcfb06c729d233bd90c792cb3b3ef341e759087ad7596e2ffceb784ba17f20d519cf1fd4cc49ba606689da77e520df32be46102b8545300f0cf1548df4795a287d290bc5cd09def1f96c5eca62e5afae2f1bac56bd2f777ef8e41ced8fc0ab8988117360c9ab8b48afa3dc84890c9d55f30b4708ba6fe3c95c915d9f39537aa800c3b0c84b3ebb53d462a3d6d3807fa8ee8904b65e44177", 0xb9, 0x2, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1f, r2, &(0x7f0000000400)="1efd6f2d31c1092465958c245b076b1e0655ce47a436cf64e43af6797e9f3638342a854eb0f0058359eaa1a6335856892de900c394a13bb5ecd2734d7fb12ee1931b023c4a1fe18c732d2b216b908b4360777dd0a1ac5d57226b1f12ace6a067d7a982fa459de43f88311c9bda9f", 0x6e, 0x3ff, 0x0, 0x0, r3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x757, r0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x59, r6, &(0x7f0000000580)="ba5687188235cd05cae9495b21fcb253468019cea34868d4789f0b35de104e5fca7fe9379d30ae4a99f38200471fc62a980f5d08d19d3676bdc47e6343e6bc71dfdee91747320d590265ec4e769a6cebe64ef4d4f68c6742421f4d750f0276dfe3611a9e16eb397aba586fc41cfeeb359a42f01e5e653aaa396295e7bec8a852b67a3d295c6b027c4245b0cb40292ac3997dc54e452fa01f66a72f674a1d40d8793c44d0f54e21e9140f1844ed5ea9263a92b684dff1189f298693c95e", 0xbd, 0x5}]) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:03 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="00000000000000000000000000000000007fffffff000000ff02000000000000000000000000000102000000000000000dfb0b390000000007000000000000000100000000000000090000000000000081000000000f0000020000000000000009000000000000000100000000000000080000000000000005000000000000000300000000000000ff7f0000fffff0e1906ccb174c0000080000002bbd7000ff3400000a00000405000000000000004a01120063636d5f62617365286563622d6165732d6e656f6e62732c736861332d3338342d63652900000000000000000000000000000000000000000000000000000000f00700000000000017df581d9180177ab0a6ae0604a9e4911d09d36cf5a28c1f4f9369b1677fba2f39712f35e5e88bdc296154c3584fee6925afeb904a055f5f26c802af0c148f842265a55b62ed93e47adf0910039020a69b254798bf436d0d3285b2eb04d0866914254ed399bd20abefa28755c5e3eec6a82c4257b5ee54772576ef71ad5b0196ca85e658fc35ebc84cda227133be28f24d467f5fb48e9afd076405db89aba666a0d9bd726c45e459e7d98db4d05f9fe4a03234b1623ee37c7b32f9b7509d2c217c8abbcd6e4419e025c63c91a06380e4168a27af9092922a2e576ac4b2eadcfae2a24445d43ece01adca2a790f59b50cef32defb2c0ce6647039e80200f70092647849682200dd4c8caa0000"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) rt_sigprocmask(0x1, &(0x7f0000000540)={[0x16e]}, &(0x7f0000000580), 0x8) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x20, 0xb, 0x7f, 0x0, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000080), 0x12}, 0x4024, 0x7, 0x2, 0x8, 0x9, 0x7f, 0x9, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) 08:56:03 executing program 4: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0xd6e78000) r1 = inotify_init1(0x80000) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480), 0x2c0840, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r5, 0x12) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r7, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r7, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r6, 0x0) sendto$inet6(r7, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r6, r7, 0x0) io_submit(0x0, 0x6, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f00000000c0)="9e9be629b9f8a34984710e9e38eeb8fa336a6f49836fcd7004a016d625e02b4186462d93e17a", 0x26, 0x7fff}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000180)="9b315e539f987bec8a15333cf7dbd846754143fcba8dfdb89db5c779cf19ee5f0c3a4a1ceb5188e5a8d584329709779fd5edba6d5fa6f901417ecbe7e480f0e791517f395d72f5adcf377c7fa02efd9685e3efdcbe8aa97c92de5f5291d7236c845c6c535d279a5eabd6c17224e1485c1f75396023c0622363cd46a0276f2330b7fc884b9ce3cfe040a6c397b85d7778305ab3971109b3bf83642cf0c8e325101f1a02fa830a918f293d0b3f122d9729ba347de9b2d96e6d042816a64a205a6417c38c5769b87551e1bd0031acd7e176fd8c8e79c42ceab202acd798d89cdb19488ce392", 0xe4, 0x6, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="74708c7824bec2acae5ba74296bf6a525192cf96d49e1634a7e6d1af9dc363f721edcfb06c729d233bd90c792cb3b3ef341e759087ad7596e2ffceb784ba17f20d519cf1fd4cc49ba606689da77e520df32be46102b8545300f0cf1548df4795a287d290bc5cd09def1f96c5eca62e5afae2f1bac56bd2f777ef8e41ced8fc0ab8988117360c9ab8b48afa3dc84890c9d55f30b4708ba6fe3c95c915d9f39537aa800c3b0c84b3ebb53d462a3d6d3807fa8ee8904b65e44177", 0xb9, 0x2, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1f, r2, &(0x7f0000000400)="1efd6f2d31c1092465958c245b076b1e0655ce47a436cf64e43af6797e9f3638342a854eb0f0058359eaa1a6335856892de900c394a13bb5ecd2734d7fb12ee1931b023c4a1fe18c732d2b216b908b4360777dd0a1ac5d57226b1f12ace6a067d7a982fa459de43f88311c9bda9f", 0x6e, 0x3ff, 0x0, 0x0, r3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x757, r0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x59, r6, &(0x7f0000000580)="ba5687188235cd05cae9495b21fcb253468019cea34868d4789f0b35de104e5fca7fe9379d30ae4a99f38200471fc62a980f5d08d19d3676bdc47e6343e6bc71dfdee91747320d590265ec4e769a6cebe64ef4d4f68c6742421f4d750f0276dfe3611a9e16eb397aba586fc41cfeeb359a42f01e5e653aaa396295e7bec8a852b67a3d295c6b027c4245b0cb40292ac3997dc54e452fa01f66a72f674a1d40d8793c44d0f54e21e9140f1844ed5ea9263a92b684dff1189f298693c95e", 0xbd, 0x5}]) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1714.261641] FAULT_INJECTION: forcing a failure. [ 1714.261641] name failslab, interval 1, probability 0, space 0, times 0 [ 1714.312451] CPU: 0 PID: 27197 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1714.320369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1714.329927] Call Trace: [ 1714.329951] dump_stack+0x1fc/0x2ef [ 1714.329970] should_fail.cold+0xa/0xf [ 1714.329989] ? setup_fault_attr+0x200/0x200 [ 1714.345084] ? lock_downgrade+0x720/0x720 [ 1714.349612] ? check_preemption_disabled+0x41/0x280 [ 1714.354813] __should_failslab+0x115/0x180 [ 1714.354832] should_failslab+0x5/0x10 08:56:03 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x110, 0x800, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c3b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x646800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x1f, 0x0, 0x4}}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x5, 0x2, 0x9dd6}}) [ 1714.354847] kmem_cache_alloc+0x277/0x370 [ 1714.354866] ext4_mb_new_blocks+0x60a/0x4370 [ 1714.354887] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1714.376486] ? ext4_cache_extents+0x68/0x2d0 [ 1714.380910] ? ext4_find_extent+0x9bb/0xc70 [ 1714.385245] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1714.390527] ? ext4_ext_search_right+0x2c7/0xb60 [ 1714.395386] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1714.400429] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1714.405053] ? __lock_acquire+0x6de/0x3ff0 08:56:03 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x520, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r1 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x4, 0x81, 0x7f, 0x0, 0x0, 0x93b40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x4, 0x1f}, 0x0, 0x80, 0x8, 0x9, 0x5, 0x8, 0x7, 0x0, 0xfffffff9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0xe) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r3, 0x0) sendto$inet6(r4, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r3, r4, 0x0) ioctl$int_out(r3, 0x5460, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1714.409302] ? mark_held_locks+0xf0/0xf0 [ 1714.413371] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1714.418746] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1714.424168] ? mark_held_locks+0xf0/0xf0 [ 1714.428423] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1714.433585] ? ext4_es_lookup_extent+0x375/0xb60 [ 1714.438497] ? ext4_map_blocks+0x59f/0x1a50 [ 1714.442952] ext4_map_blocks+0x7a2/0x1a50 [ 1714.447143] ? check_preemption_disabled+0x41/0x280 [ 1714.452158] ? ext4_issue_zeroout+0x160/0x160 [ 1714.456666] ? __brelse+0x84/0xa0 [ 1714.460460] ? __ext4_new_inode+0x2eb/0x5a20 [ 1714.464977] ext4_getblk+0xad/0x4f0 [ 1714.468604] ? ext4_iomap_begin+0xe00/0xe00 [ 1714.473121] ? ext4_free_inode+0x1780/0x1780 [ 1714.477787] ? debug_check_no_obj_freed+0x201/0x490 [ 1714.482894] ? __dquot_initialize+0x298/0xb70 [ 1714.487401] ext4_bread+0x7c/0x210 [ 1714.491198] ? ext4_getblk+0x4f0/0x4f0 [ 1714.495110] ? dquot_initialize_needed+0x290/0x290 [ 1714.500064] ? trace_hardirqs_off+0x64/0x200 [ 1714.504469] ext4_append+0x155/0x370 [ 1714.508190] ext4_mkdir+0x5bd/0xe10 [ 1714.512080] ? ext4_init_dot_dotdot+0x600/0x600 [ 1714.516761] ? generic_permission+0x116/0x4d0 [ 1714.521267] ? inode_permission.part.0+0x10c/0x450 [ 1714.526190] vfs_mkdir+0x508/0x7a0 [ 1714.529742] do_mkdirat+0x262/0x2d0 [ 1714.533361] ? __ia32_sys_mknod+0x120/0x120 [ 1714.537690] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1714.542717] ? do_syscall_64+0x21/0x620 [ 1714.546680] do_syscall_64+0xf9/0x620 [ 1714.550475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1714.555664] RIP: 0033:0x4656e7 [ 1714.558864] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1714.577778] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1714.585597] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1714.592864] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1714.600124] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1714.607547] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1714.614914] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:03 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:03 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:03 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r0, 0x0) sendto$inet6(r1, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14, 0x80000) recvmmsg(r3, &(0x7f0000000f40)=[{{&(0x7f00000000c0)=@caif=@util, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/119, 0x77}, 0x6}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000001180)=""/219, 0xdb}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000001080)=""/238, 0xee}], 0x4, &(0x7f0000000540)=""/252, 0xfc}, 0x10000}, {{&(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000780)=""/193, 0xc1}, {&(0x7f0000000880)=""/83, 0x53}, {&(0x7f0000000900)=""/242, 0xf2}], 0x3, &(0x7f0000000a00)=""/181, 0xb5}, 0xffffc952}, {{&(0x7f0000000b00)=@rc, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000b80)=""/158, 0x9e}, {&(0x7f0000000c40)=""/118, 0x76}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/184, 0xb8}, {&(0x7f0000000240)=""/128, 0x80}], 0x5, &(0x7f0000000ec0)=""/104, 0x68}}], 0x4, 0x102, &(0x7f0000001040)) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000080)={{0x3, 0x1, 0x101}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:03 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x3, 0x2, 0x1ff, 0x0, 0x7}}) [ 1714.858656] FAULT_INJECTION: forcing a failure. [ 1714.858656] name failslab, interval 1, probability 0, space 0, times 0 [ 1714.878081] CPU: 1 PID: 27241 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1714.886002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1714.895561] Call Trace: [ 1714.898145] dump_stack+0x1fc/0x2ef [ 1714.901877] should_fail.cold+0xa/0xf [ 1714.905844] ? setup_fault_attr+0x200/0x200 [ 1714.910286] ? lock_downgrade+0x720/0x720 [ 1714.914473] ? check_preemption_disabled+0x41/0x280 [ 1714.919680] __should_failslab+0x115/0x180 [ 1714.924048] should_failslab+0x5/0x10 [ 1714.927847] kmem_cache_alloc+0x277/0x370 [ 1714.932333] ext4_mb_new_blocks+0x60a/0x4370 [ 1714.936744] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1714.941807] ? ext4_cache_extents+0x68/0x2d0 [ 1714.946245] ? ext4_find_extent+0x9bb/0xc70 [ 1714.950716] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1714.956005] ? ext4_ext_search_right+0x2c7/0xb60 [ 1714.960757] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1714.965767] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1714.970591] ? __lock_acquire+0x6de/0x3ff0 [ 1714.974826] ? mark_held_locks+0xf0/0xf0 [ 1714.978911] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1714.984281] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1714.989472] ? mark_held_locks+0xf0/0xf0 [ 1714.993544] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1714.998394] ? ext4_es_lookup_extent+0x375/0xb60 [ 1715.003158] ? ext4_map_blocks+0x59f/0x1a50 [ 1715.007598] ext4_map_blocks+0x7a2/0x1a50 [ 1715.011782] ? check_preemption_disabled+0x41/0x280 [ 1715.017036] ? ext4_issue_zeroout+0x160/0x160 [ 1715.021525] ? __brelse+0x84/0xa0 [ 1715.025061] ? __ext4_new_inode+0x2eb/0x5a20 [ 1715.029471] ext4_getblk+0xad/0x4f0 [ 1715.033094] ? ext4_iomap_begin+0xe00/0xe00 [ 1715.037862] ? ext4_free_inode+0x1780/0x1780 [ 1715.042271] ? debug_check_no_obj_freed+0x201/0x490 [ 1715.047423] ? __dquot_initialize+0x298/0xb70 [ 1715.052219] ext4_bread+0x7c/0x210 [ 1715.056699] ? ext4_getblk+0x4f0/0x4f0 [ 1715.060585] ? dquot_initialize_needed+0x290/0x290 [ 1715.065633] ? trace_hardirqs_off+0x64/0x200 [ 1715.070034] ext4_append+0x155/0x370 [ 1715.073926] ext4_mkdir+0x5bd/0xe10 [ 1715.077583] ? ext4_init_dot_dotdot+0x600/0x600 [ 1715.082249] ? generic_permission+0x116/0x4d0 [ 1715.086912] ? inode_permission.part.0+0x10c/0x450 [ 1715.092036] vfs_mkdir+0x508/0x7a0 [ 1715.095582] do_mkdirat+0x262/0x2d0 [ 1715.099335] ? __ia32_sys_mknod+0x120/0x120 [ 1715.104156] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1715.110127] ? do_syscall_64+0x21/0x620 [ 1715.114248] do_syscall_64+0xf9/0x620 [ 1715.118063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1715.123337] RIP: 0033:0x4656e7 [ 1715.126543] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1715.148206] RSP: 002b:00007fab52535fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1715.155997] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004656e7 [ 1715.163267] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1715.170548] RBP: 00007fab52536040 R08: 0000000000000000 R09: ffffffffffffffff [ 1715.178008] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1715.178019] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x0, 0x4f, 0x7, '\x00', &(0x7f00000000c0)=0x20}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x2b20e000) 08:56:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:06 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:06 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:06 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="00000000000000000000000000000000007fffffff000000ff02000000000000000000000000000102000000000000000dfb0b390000000007000000000000000100000000000000090000000000000081000000000f0000020000000000000009000000000000000100000000000000080000000000000005000000000000000300000000000000ff7f0000fffff0e1906ccb174c0000080000002bbd7000ff3400000a00000405000000000000004a01120063636d5f62617365286563622d6165732d6e656f6e62732c736861332d3338342d63652900000000000000000000000000000000000000000000000000000000f00700000000000017df581d9180177ab0a6ae0604a9e4911d09d36cf5a28c1f4f9369b1677fba2f39712f35e5e88bdc296154c3584fee6925afeb904a055f5f26c802af0c148f842265a55b62ed93e47adf0910039020a69b254798bf436d0d3285b2eb04d0866914254ed399bd20abefa28755c5e3eec6a82c4257b5ee54772576ef71ad5b0196ca85e658fc35ebc84cda227133be28f24d467f5fb48e9afd076405db89aba666a0d9bd726c45e459e7d98db4d05f9fe4a03234b1623ee37c7b32f9b7509d2c217c8abbcd6e4419e025c63c91a06380e4168a27af9092922a2e576ac4b2eadcfae2a24445d43ece01adca2a790f59b50cef32defb2c0ce6647039e80200f70092647849682200dd4c8caa0000"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) rt_sigprocmask(0x1, &(0x7f0000000540)={[0x16e]}, &(0x7f0000000580), 0x8) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x20, 0xb, 0x7f, 0x0, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000080), 0x12}, 0x4024, 0x7, 0x2, 0x8, 0x9, 0x7f, 0x9, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) [ 1717.319334] FAULT_INJECTION: forcing a failure. [ 1717.319334] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.336192] CPU: 1 PID: 27283 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1717.344214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1717.353730] Call Trace: [ 1717.356386] dump_stack+0x1fc/0x2ef [ 1717.360220] should_fail.cold+0xa/0xf [ 1717.364041] ? setup_fault_attr+0x200/0x200 08:56:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r0, 0x0) sendto$inet6(r1, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1000) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1717.368388] ? lock_acquire+0x170/0x3c0 [ 1717.372389] __should_failslab+0x115/0x180 [ 1717.376633] should_failslab+0x5/0x10 [ 1717.380430] kmem_cache_alloc_trace+0x284/0x380 [ 1717.385361] ? _copy_from_user+0xd2/0x130 [ 1717.389603] copy_mount_options+0x59/0x380 [ 1717.393885] ksys_mount+0x9b/0x130 [ 1717.397420] __x64_sys_mount+0xba/0x150 [ 1717.401384] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1717.405954] do_syscall_64+0xf9/0x620 [ 1717.409959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1717.415898] RIP: 0033:0x467afa [ 1717.419096] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.438493] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1717.446330] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1717.453693] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1717.460968] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1717.468314] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1717.475603] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:06 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:06 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x1f}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x3, 0x0, 0xc6, 0x3, 0x8}) [ 1717.663503] FAULT_INJECTION: forcing a failure. [ 1717.663503] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.677984] CPU: 0 PID: 27315 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1717.685903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1717.695374] Call Trace: [ 1717.698502] dump_stack+0x1fc/0x2ef [ 1717.702163] should_fail.cold+0xa/0xf [ 1717.706171] ? setup_fault_attr+0x200/0x200 [ 1717.711378] ? lock_acquire+0x170/0x3c0 [ 1717.715461] __should_failslab+0x115/0x180 [ 1717.719879] should_failslab+0x5/0x10 [ 1717.723691] kmem_cache_alloc+0x277/0x370 [ 1717.728027] alloc_vfsmnt+0x23/0x780 [ 1717.731766] ? _raw_read_unlock+0x29/0x40 [ 1717.735934] vfs_kern_mount.part.0+0x27/0x470 [ 1717.740447] do_mount+0x113c/0x2f10 [ 1717.744215] ? cmp_ex_sort+0xc0/0xc0 [ 1717.747938] ? __do_page_fault+0x180/0xd60 [ 1717.752162] ? copy_mount_string+0x40/0x40 [ 1717.756562] ? memset+0x20/0x40 [ 1717.759824] ? copy_mount_options+0x26f/0x380 [ 1717.764592] ksys_mount+0xcf/0x130 [ 1717.768206] __x64_sys_mount+0xba/0x150 [ 1717.772381] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1717.777052] do_syscall_64+0xf9/0x620 [ 1717.780850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1717.786206] RIP: 0033:0x467afa [ 1717.789634] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:56:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1717.808748] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1717.816985] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1717.824271] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1717.831565] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1717.838906] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1717.846162] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 08:56:09 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:09 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xb0b9d6c900000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x408080, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) 08:56:09 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="00000000000000000000000000000000007fffffff000000ff02000000000000000000000000000102000000000000000dfb0b390000000007000000000000000100000000000000090000000000000081000000000f0000020000000000000009000000000000000100000000000000080000000000000005000000000000000300000000000000ff7f0000fffff0e1906ccb174c0000080000002bbd7000ff3400000a00000405000000000000004a01120063636d5f62617365286563622d6165732d6e656f6e62732c736861332d3338342d63652900000000000000000000000000000000000000000000000000000000f00700000000000017df581d9180177ab0a6ae0604a9e4911d09d36cf5a28c1f4f9369b1677fba2f39712f35e5e88bdc296154c3584fee6925afeb904a055f5f26c802af0c148f842265a55b62ed93e47adf0910039020a69b254798bf436d0d3285b2eb04d0866914254ed399bd20abefa28755c5e3eec6a82c4257b5ee54772576ef71ad5b0196ca85e658fc35ebc84cda227133be28f24d467f5fb48e9afd076405db89aba666a0d9bd726c45e459e7d98db4d05f9fe4a03234b1623ee37c7b32f9b7509d2c217c8abbcd6e4419e025c63c91a06380e4168a27af9092922a2e576ac4b2eadcfae2a24445d43ece01adca2a790f59b50cef32defb2c0ce6647039e80200f70092647849682200dd4c8caa0000"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) rt_sigprocmask(0x1, &(0x7f0000000540)={[0x16e]}, &(0x7f0000000580), 0x8) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x20, 0xb, 0x7f, 0x0, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000080), 0x12}, 0x4024, 0x7, 0x2, 0x8, 0x9, 0x7f, 0x9, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) 08:56:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 08:56:09 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1720.385413] FAULT_INJECTION: forcing a failure. [ 1720.385413] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.420702] CPU: 0 PID: 27368 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1720.428621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1720.437991] Call Trace: [ 1720.440620] dump_stack+0x1fc/0x2ef [ 1720.444455] should_fail.cold+0xa/0xf [ 1720.448397] ? setup_fault_attr+0x200/0x200 [ 1720.452737] ? lock_acquire+0x170/0x3c0 [ 1720.456732] __should_failslab+0x115/0x180 [ 1720.460996] should_failslab+0x5/0x10 [ 1720.464798] kmem_cache_alloc+0x277/0x370 [ 1720.469200] getname_flags+0xce/0x590 [ 1720.473086] user_path_at_empty+0x2a/0x50 [ 1720.477411] do_mount+0x147/0x2f10 [ 1720.480940] ? cmp_ex_sort+0xc0/0xc0 [ 1720.484782] ? __do_page_fault+0x180/0xd60 [ 1720.489325] ? copy_mount_string+0x40/0x40 [ 1720.493653] ? memset+0x20/0x40 [ 1720.496918] ? copy_mount_options+0x26f/0x380 [ 1720.501413] ksys_mount+0xcf/0x130 [ 1720.504949] __x64_sys_mount+0xba/0x150 [ 1720.508916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1720.513516] do_syscall_64+0xf9/0x620 [ 1720.517345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1720.522548] RIP: 0033:0x467afa [ 1720.525816] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.545168] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1720.552998] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1720.560453] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1720.568251] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1720.575522] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1720.582794] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x10010, r1, 0x2d351000) 08:56:09 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:09 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1720.733076] FAULT_INJECTION: forcing a failure. [ 1720.733076] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.751136] CPU: 1 PID: 27393 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1720.759368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1720.768728] Call Trace: [ 1720.771349] dump_stack+0x1fc/0x2ef [ 1720.775614] should_fail.cold+0xa/0xf [ 1720.779515] ? setup_fault_attr+0x200/0x200 [ 1720.783847] ? lock_acquire+0x170/0x3c0 [ 1720.787834] __should_failslab+0x115/0x180 [ 1720.792083] should_failslab+0x5/0x10 [ 1720.795893] kmem_cache_alloc+0x277/0x370 [ 1720.800056] alloc_vfsmnt+0x23/0x780 [ 1720.803857] ? _raw_read_unlock+0x29/0x40 [ 1720.808015] vfs_kern_mount.part.0+0x27/0x470 [ 1720.812622] do_mount+0x113c/0x2f10 [ 1720.816263] ? cmp_ex_sort+0xc0/0xc0 [ 1720.819972] ? __do_page_fault+0x180/0xd60 [ 1720.824209] ? copy_mount_string+0x40/0x40 [ 1720.828446] ? memset+0x20/0x40 [ 1720.831731] ? copy_mount_options+0x26f/0x380 [ 1720.836500] ksys_mount+0xcf/0x130 [ 1720.840056] __x64_sys_mount+0xba/0x150 [ 1720.844211] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1720.848782] do_syscall_64+0xf9/0x620 [ 1720.852584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1720.857960] RIP: 0033:0x467afa [ 1720.861146] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.880122] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1720.887823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1720.895088] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1720.902610] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1720.909885] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1720.917299] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0xfffffffffffffffe, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) fchmod(r1, 0x0) sendto$inet6(r2, &(0x7f00000003c0)="c0", 0x1, 0x3fffffa, 0x0, 0x0) dup3(r1, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x10010, r1, 0x2d351000) 08:56:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 08:56:12 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:12 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:12 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="cc09000000000000b97d0000000000003f0000000000000000000000000000001e000000000000002000000000000000090000000000000000040000000000000800000000000000ff07000000000000b10b000000000000090000000000000000000000b36b6e00010101010000000040000000000000000c00080008000800010000004d0002006c72772d63616d656c6c69612d61736d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028000000811158e848000000e400060000000000000000000000000000000001ac1414aa0000000000000000000000004e2100034e2200050a00208000000000", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) rt_sigprocmask(0x1, &(0x7f0000000540)={[0x16e]}, &(0x7f0000000580), 0x8) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x20, 0xb, 0x7f, 0x0, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000080), 0x12}, 0x4024, 0x7, 0x2, 0x8, 0x9, 0x7f, 0x9, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) [ 1723.396441] FAULT_INJECTION: forcing a failure. [ 1723.396441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1723.408518] CPU: 0 PID: 27426 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1723.416395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.425755] Call Trace: [ 1723.428348] dump_stack+0x1fc/0x2ef [ 1723.428369] should_fail.cold+0xa/0xf [ 1723.435865] ? setup_fault_attr+0x200/0x200 [ 1723.440287] ? unwind_next_frame+0xeee/0x1400 [ 1723.444793] ? __save_stack_trace+0x72/0x190 [ 1723.449202] ? deref_stack_reg+0x134/0x1d0 [ 1723.453440] ? get_reg+0x176/0x1f0 [ 1723.457266] __alloc_pages_nodemask+0x239/0x2890 [ 1723.462215] ? cmp_ex_search+0x87/0xb0 [ 1723.466367] ? __lock_acquire+0x6de/0x3ff0 [ 1723.470630] ? copy_mount_options+0x1e9/0x380 [ 1723.475138] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1723.480127] ? ex_handler_default+0x14/0x90 [ 1723.484452] ? phys_mem_access_encrypted+0x10/0x10 [ 1723.489389] ? no_context+0xce/0x940 [ 1723.493096] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 1723.498809] ? bad_area_access_error+0x23b/0x4a0 [ 1723.503747] cache_grow_begin+0xa4/0x8a0 [ 1723.507801] ? setup_fault_attr+0x200/0x200 [ 1723.512129] ? lock_acquire+0x170/0x3c0 [ 1723.516152] cache_alloc_refill+0x273/0x340 [ 1723.520472] kmem_cache_alloc+0x346/0x370 [ 1723.524631] getname_flags+0xce/0x590 [ 1723.528462] user_path_at_empty+0x2a/0x50 [ 1723.532645] do_mount+0x147/0x2f10 [ 1723.536380] ? cmp_ex_sort+0xc0/0xc0 [ 1723.540211] ? __do_page_fault+0x180/0xd60 [ 1723.544445] ? copy_mount_string+0x40/0x40 [ 1723.548680] ? memset+0x20/0x40 [ 1723.551946] ? copy_mount_options+0x26f/0x380 [ 1723.556437] ksys_mount+0xcf/0x130 [ 1723.559982] __x64_sys_mount+0xba/0x150 [ 1723.563950] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1723.568521] do_syscall_64+0xf9/0x620 [ 1723.572375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1723.577720] RIP: 0033:0x467afa [ 1723.580914] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.599816] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1723.607569] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1723.614939] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1723.622214] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1723.629566] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1723.636930] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:12 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1723.662463] EXT4-fs (loop3): unsupported descriptor size 0 [ 1723.693883] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1723.704631] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1723.719669] EXT4-fs (loop5): mount failed 08:56:12 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:12 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1723.809879] FAULT_INJECTION: forcing a failure. [ 1723.809879] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.825883] CPU: 1 PID: 27454 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1723.833787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.843596] Call Trace: [ 1723.846212] dump_stack+0x1fc/0x2ef [ 1723.849837] should_fail.cold+0xa/0xf [ 1723.853641] ? setup_fault_attr+0x200/0x200 [ 1723.858072] ? lock_acquire+0x170/0x3c0 [ 1723.862048] __should_failslab+0x115/0x180 [ 1723.866280] should_failslab+0x5/0x10 [ 1723.870093] __kmalloc+0x2ab/0x3c0 [ 1723.873624] ? __se_sys_memfd_create+0xf8/0x440 [ 1723.878280] __se_sys_memfd_create+0xf8/0x440 [ 1723.882760] ? memfd_file_seals_ptr+0x150/0x150 [ 1723.887514] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1723.892876] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1723.897887] ? do_syscall_64+0x21/0x620 [ 1723.901861] do_syscall_64+0xf9/0x620 [ 1723.905661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1723.910933] RIP: 0033:0x4665d9 [ 1723.914135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.933052] RSP: 002b:00007f5bb8374f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1723.940768] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1723.948028] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00000000004bee66 08:56:12 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1723.955292] RBP: 0000000000000006 R08: 0000000000004400 R09: ffffffffffffffff [ 1723.962562] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 1723.969824] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1724.024765] FAULT_INJECTION: forcing a failure. [ 1724.024765] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.029314] FAULT_INJECTION: forcing a failure. [ 1724.029314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1724.044106] CPU: 1 PID: 27466 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1724.055813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.065529] Call Trace: [ 1724.068124] dump_stack+0x1fc/0x2ef [ 1724.071775] should_fail.cold+0xa/0xf [ 1724.075672] ? setup_fault_attr+0x200/0x200 [ 1724.079980] ? lock_acquire+0x170/0x3c0 [ 1724.083946] __should_failslab+0x115/0x180 [ 1724.088167] should_failslab+0x5/0x10 [ 1724.091958] kmem_cache_alloc+0x277/0x370 [ 1724.096097] ? shmem_destroy_callback+0xb0/0xb0 [ 1724.100758] shmem_alloc_inode+0x18/0x40 [ 1724.104827] ? shmem_destroy_callback+0xb0/0xb0 [ 1724.109483] alloc_inode+0x5d/0x180 [ 1724.113097] new_inode+0x1d/0xf0 [ 1724.116459] shmem_get_inode+0x96/0x8d0 [ 1724.120426] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1724.125259] shmem_file_setup+0x61/0x90 [ 1724.129308] __se_sys_memfd_create+0x26b/0x440 [ 1724.133877] ? memfd_file_seals_ptr+0x150/0x150 [ 1724.138622] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1724.143989] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1724.149021] ? do_syscall_64+0x21/0x620 [ 1724.153077] do_syscall_64+0xf9/0x620 [ 1724.156877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1724.162074] RIP: 0033:0x4665d9 [ 1724.165273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.184184] RSP: 002b:00007f5bb8374f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1724.191878] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1724.199139] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1724.206407] RBP: 0000000000000006 R08: 0000000000004400 R09: ffffffffffffffff [ 1724.213802] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 1724.221082] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1724.228384] CPU: 0 PID: 27457 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1724.236279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.245735] Call Trace: [ 1724.248336] dump_stack+0x1fc/0x2ef [ 1724.251977] should_fail.cold+0xa/0xf [ 1724.255786] ? lock_acquire+0x170/0x3c0 [ 1724.259766] ? setup_fault_attr+0x200/0x200 [ 1724.264112] __alloc_pages_nodemask+0x239/0x2890 [ 1724.268875] ? pcpu_alloc+0x91f/0x1190 08:56:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:13 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="00000000000000000000000000000000007fffffff000000ff02000000000000000000000000000102000000000000000dfb0b390000000007000000000000000100000000000000090000000000000081000000000f0000020000000000000009000000000000000100000000000000080000000000000005000000000000000300000000000000ff7f0000fffff0e1906ccb174c0000080000002bbd7000ff3400000a00000405000000000000004a01120063636d5f62617365286563622d6165732d6e656f6e62732c736861332d3338342d63652900000000000000000000000000000000000000000000000000000000f00700000000000017df581d9180177ab0a6ae0604a9e4911d09d36cf5a28c1f4f9369b1677fba2f39712f35e5e88bdc296154c3584fee6925afeb904a055f5f26c802af0c148f842265a55b62ed93e47adf0910039020a69b254798bf436d0d3285b2eb04d0866914254ed399bd20abefa28755c5e3eec6a82c4257b5ee54772576ef71ad5b0196ca85e658fc35ebc84cda227133be28f24d467f5fb48e9afd076405db89aba666a0d9bd726c45e459e7d98db4d05f9fe4a03234b1623ee37c7b32f9b7509d2c217c8abbcd6e4419e025c63c91a06380e4168a27af9092922a2e576ac4b2eadcfae2a24445d43ece01adca2a790f59b50cef32defb2c0ce6647039e80200f70092647849682200dd4c8caa0000"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) rt_sigprocmask(0x1, &(0x7f0000000540)={[0x16e]}, &(0x7f0000000580), 0x8) 08:56:13 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1724.272770] ? mark_held_locks+0xf0/0xf0 [ 1724.276841] ? pcpu_alloc+0xe78/0x1190 [ 1724.280747] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1724.285597] ? check_preemption_disabled+0x41/0x280 [ 1724.290610] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1724.295917] ? pcpu_alloc+0xc9/0x1190 [ 1724.299741] alloc_pages_current+0x193/0x2a0 [ 1724.304396] ? __lockdep_init_map+0x100/0x5a0 [ 1724.308882] get_zeroed_page+0x10/0x40 [ 1724.312766] mount_fs+0x203/0x310 [ 1724.316221] vfs_kern_mount.part.0+0x68/0x470 [ 1724.320702] do_mount+0x113c/0x2f10 [ 1724.324366] ? cmp_ex_sort+0xc0/0xc0 [ 1724.328117] ? __do_page_fault+0x180/0xd60 [ 1724.332342] ? copy_mount_string+0x40/0x40 [ 1724.336616] ? memset+0x20/0x40 [ 1724.339885] ? copy_mount_options+0x26f/0x380 [ 1724.344365] ksys_mount+0xcf/0x130 [ 1724.347907] __x64_sys_mount+0xba/0x150 [ 1724.352041] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1724.356664] do_syscall_64+0xf9/0x620 [ 1724.360452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1724.366316] RIP: 0033:0x467afa [ 1724.369497] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.388394] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1724.396111] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1724.403549] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1724.410802] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1724.418060] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1724.425329] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1724.500595] FAULT_INJECTION: forcing a failure. [ 1724.500595] name failslab, interval 1, probability 0, space 0, times 0 [ 1724.513615] CPU: 0 PID: 27476 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1724.521509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.531056] Call Trace: [ 1724.533664] dump_stack+0x1fc/0x2ef [ 1724.537312] should_fail.cold+0xa/0xf [ 1724.541129] ? setup_fault_attr+0x200/0x200 [ 1724.545464] ? lock_acquire+0x170/0x3c0 [ 1724.549456] __should_failslab+0x115/0x180 [ 1724.553796] should_failslab+0x5/0x10 [ 1724.557610] kmem_cache_alloc+0x277/0x370 [ 1724.561785] __d_alloc+0x2b/0xa10 [ 1724.565254] d_alloc_pseudo+0x19/0x70 [ 1724.569071] alloc_file_pseudo+0xc6/0x250 [ 1724.573231] ? alloc_file+0x4d0/0x4d0 [ 1724.577053] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1724.583217] ? shmem_get_inode+0x44c/0x8d0 [ 1724.587703] __shmem_file_setup.part.0+0x102/0x2b0 [ 1724.592653] shmem_file_setup+0x61/0x90 [ 1724.596643] __se_sys_memfd_create+0x26b/0x440 [ 1724.601265] ? memfd_file_seals_ptr+0x150/0x150 [ 1724.606045] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1724.611427] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1724.616458] ? do_syscall_64+0x21/0x620 [ 1724.620503] do_syscall_64+0xf9/0x620 [ 1724.624730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1724.629979] RIP: 0033:0x4665d9 [ 1724.633194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1724.652311] RSP: 002b:00007f5bb8374f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1724.660036] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1724.667312] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1724.674591] RBP: 0000000000000006 R08: 0000000000004400 R09: ffffffffffffffff [ 1724.682052] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 1724.689330] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 08:56:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 08:56:15 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:15 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:15 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:15 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x40, 0x6, 0x6, 0x4, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000480), 0x1}, 0x4000, 0x200000004000000, 0x5, 0x2, 0x40, 0xda35, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r6, 0x7, r0, 0xa) [ 1726.394446] FAULT_INJECTION: forcing a failure. [ 1726.394446] name failslab, interval 1, probability 0, space 0, times 0 [ 1726.400262] FAULT_INJECTION: forcing a failure. [ 1726.400262] name failslab, interval 1, probability 0, space 0, times 0 [ 1726.415916] CPU: 0 PID: 27499 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1726.425000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.434383] Call Trace: [ 1726.436985] dump_stack+0x1fc/0x2ef [ 1726.440625] should_fail.cold+0xa/0xf [ 1726.444513] ? setup_fault_attr+0x200/0x200 [ 1726.448837] ? lock_acquire+0x170/0x3c0 [ 1726.452813] __should_failslab+0x115/0x180 [ 1726.457051] should_failslab+0x5/0x10 [ 1726.460849] kmem_cache_alloc+0x277/0x370 [ 1726.465006] __alloc_file+0x21/0x330 [ 1726.468721] alloc_empty_file+0x6d/0x170 [ 1726.472786] alloc_file+0x5e/0x4d0 [ 1726.476331] alloc_file_pseudo+0x165/0x250 [ 1726.480564] ? alloc_file+0x4d0/0x4d0 [ 1726.484368] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1726.489991] ? shmem_get_inode+0x44c/0x8d0 [ 1726.490014] __shmem_file_setup.part.0+0x102/0x2b0 [ 1726.490034] shmem_file_setup+0x61/0x90 [ 1726.503136] __se_sys_memfd_create+0x26b/0x440 [ 1726.507726] ? memfd_file_seals_ptr+0x150/0x150 [ 1726.512399] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1726.517779] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1726.522796] ? do_syscall_64+0x21/0x620 [ 1726.526781] do_syscall_64+0xf9/0x620 [ 1726.530581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1726.535766] RIP: 0033:0x4665d9 [ 1726.538946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1726.557836] RSP: 002b:00007f5bb8374f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1726.568054] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1726.575327] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 1726.582782] RBP: 0000000000000006 R08: 0000000000004400 R09: ffffffffffffffff [ 1726.590065] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 1726.597324] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 [ 1726.613332] CPU: 0 PID: 27495 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1726.621248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.630611] Call Trace: [ 1726.633302] dump_stack+0x1fc/0x2ef [ 1726.636952] should_fail.cold+0xa/0xf [ 1726.640783] ? setup_fault_attr+0x200/0x200 [ 1726.645118] ? lock_acquire+0x170/0x3c0 [ 1726.649108] __should_failslab+0x115/0x180 [ 1726.653532] should_failslab+0x5/0x10 [ 1726.657346] __kmalloc_track_caller+0x2a6/0x3c0 [ 1726.662029] ? kstrdup_const+0x53/0x80 [ 1726.665928] kstrdup+0x36/0x70 [ 1726.669129] kstrdup_const+0x53/0x80 [ 1726.672852] alloc_vfsmnt+0xb5/0x780 [ 1726.676612] ? _raw_read_unlock+0x29/0x40 [ 1726.680769] vfs_kern_mount.part.0+0x27/0x470 [ 1726.685276] do_mount+0x113c/0x2f10 [ 1726.688916] ? cmp_ex_sort+0xc0/0xc0 [ 1726.692668] ? __do_page_fault+0x180/0xd60 [ 1726.696915] ? copy_mount_string+0x40/0x40 [ 1726.701169] ? memset+0x20/0x40 [ 1726.704455] ? copy_mount_options+0x26f/0x380 [ 1726.708987] ksys_mount+0xcf/0x130 [ 1726.712524] __x64_sys_mount+0xba/0x150 [ 1726.716489] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1726.721060] do_syscall_64+0xf9/0x620 [ 1726.724866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1726.730066] RIP: 0033:0x467afa [ 1726.733348] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1726.752252] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1726.760047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1726.767662] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1726.774937] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1726.782191] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:56:15 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:15 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffff1f0000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1726.789447] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1726.829895] FAULT_INJECTION: forcing a failure. [ 1726.829895] name failslab, interval 1, probability 0, space 0, times 0 [ 1726.844948] CPU: 0 PID: 27512 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1726.852834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1726.862194] Call Trace: [ 1726.864781] dump_stack+0x1fc/0x2ef [ 1726.868415] should_fail.cold+0xa/0xf [ 1726.872214] ? setup_fault_attr+0x200/0x200 [ 1726.876521] ? lock_acquire+0x170/0x3c0 [ 1726.880612] __should_failslab+0x115/0x180 [ 1726.884835] should_failslab+0x5/0x10 [ 1726.888618] kmem_cache_alloc_trace+0x284/0x380 [ 1726.893298] apparmor_file_alloc_security+0x394/0xad0 [ 1726.898472] ? do_raw_spin_unlock+0x171/0x230 [ 1726.902955] ? apparmor_file_receive+0x160/0x160 [ 1726.907783] ? __alloc_file+0x21/0x330 [ 1726.911662] security_file_alloc+0x40/0x90 [ 1726.915891] __alloc_file+0xc9/0x330 [ 1726.919594] alloc_empty_file+0x6d/0x170 [ 1726.923731] alloc_file+0x5e/0x4d0 [ 1726.927259] alloc_file_pseudo+0x165/0x250 [ 1726.931577] ? alloc_file+0x4d0/0x4d0 [ 1726.935365] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1726.940995] ? shmem_get_inode+0x44c/0x8d0 [ 1726.945217] __shmem_file_setup.part.0+0x102/0x2b0 [ 1726.950149] shmem_file_setup+0x61/0x90 [ 1726.954111] __se_sys_memfd_create+0x26b/0x440 [ 1726.958695] ? memfd_file_seals_ptr+0x150/0x150 [ 1726.963372] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1726.968723] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1726.973725] ? do_syscall_64+0x21/0x620 [ 1726.977693] do_syscall_64+0xf9/0x620 [ 1726.981571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1726.986743] RIP: 0033:0x4665d9 [ 1726.989934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1727.008820] RSP: 002b:00007f5bb8374f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1727.016548] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665d9 [ 1727.023827] RDX: 0000000000008800 RSI: 0000000000000000 RDI: 00000000004bee66 08:56:16 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1727.031104] RBP: 0000000000000006 R08: 0000000000004400 R09: ffffffffffffffff [ 1727.038446] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000008100000 [ 1727.045741] R13: 0000000020000100 R14: 0000000000200000 R15: 0000000020001800 08:56:16 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1727.189952] FAULT_INJECTION: forcing a failure. [ 1727.189952] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1727.216273] CPU: 0 PID: 27521 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1727.224190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1727.233589] Call Trace: [ 1727.236209] dump_stack+0x1fc/0x2ef [ 1727.239845] should_fail.cold+0xa/0xf [ 1727.243659] ? lock_acquire+0x170/0x3c0 [ 1727.247709] ? setup_fault_attr+0x200/0x200 [ 1727.252138] __alloc_pages_nodemask+0x239/0x2890 [ 1727.256891] ? __lock_acquire+0x6de/0x3ff0 [ 1727.261127] ? static_obj+0x50/0x50 [ 1727.264922] ? __lock_acquire+0x6de/0x3ff0 [ 1727.269144] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1727.274087] ? __lock_acquire+0x6de/0x3ff0 [ 1727.278357] ? mark_held_locks+0xf0/0xf0 [ 1727.282416] ? unwind_next_frame+0xeee/0x1400 [ 1727.286917] ? mark_held_locks+0xf0/0xf0 [ 1727.290982] ? deref_stack_reg+0x134/0x1d0 [ 1727.295243] ? get_reg+0x176/0x1f0 [ 1727.299223] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1727.305198] alloc_pages_vma+0xf2/0x780 [ 1727.309166] shmem_alloc_page+0x11c/0x1f0 [ 1727.313328] ? shmem_swapin+0x220/0x220 [ 1727.317331] ? percpu_counter_add_batch+0x126/0x180 [ 1727.322361] ? __vm_enough_memory+0x316/0x650 [ 1727.326855] shmem_alloc_and_acct_page+0x15a/0x850 [ 1727.331792] shmem_getpage_gfp+0x4e9/0x37f0 [ 1727.336145] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1727.342573] ? mark_held_locks+0xa6/0xf0 [ 1727.346629] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1727.351822] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1727.357012] shmem_write_begin+0xff/0x1e0 [ 1727.361162] generic_perform_write+0x1f8/0x4d0 [ 1727.365759] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1727.370426] ? current_time+0x1c0/0x1c0 [ 1727.374395] ? lock_acquire+0x170/0x3c0 [ 1727.378376] __generic_file_write_iter+0x24b/0x610 [ 1727.383306] generic_file_write_iter+0x3f8/0x730 [ 1727.388071] __vfs_write+0x51b/0x770 [ 1727.391788] ? kernel_read+0x110/0x110 [ 1727.395700] ? check_preemption_disabled+0x41/0x280 [ 1727.400731] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1727.405915] vfs_write+0x1f3/0x540 [ 1727.409444] __x64_sys_pwrite64+0x1f7/0x250 [ 1727.413750] ? ksys_pwrite64+0x1a0/0x1a0 [ 1727.417810] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1727.422822] ? do_syscall_64+0x21/0x620 [ 1727.426799] do_syscall_64+0xf9/0x620 [ 1727.430589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1727.435866] RIP: 0033:0x419777 08:56:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:16 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1727.439042] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1727.458021] RSP: 002b:00007f5bb8374f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1727.465736] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1727.473260] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 1727.480540] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff 08:56:16 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) r10 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r10, 0x40345410, &(0x7f0000000000)={{0x0, 0x3, 0x32}}) [ 1727.487798] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1727.495050] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1727.539563] FAULT_INJECTION: forcing a failure. [ 1727.539563] name failslab, interval 1, probability 0, space 0, times 0 [ 1727.572211] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1727.591190] CPU: 0 PID: 27524 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1727.599097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1727.608448] Call Trace: [ 1727.611030] dump_stack+0x1fc/0x2ef [ 1727.614647] should_fail.cold+0xa/0xf [ 1727.618431] ? setup_fault_attr+0x200/0x200 [ 1727.622741] ? lock_acquire+0x170/0x3c0 [ 1727.626714] __should_failslab+0x115/0x180 [ 1727.631133] should_failslab+0x5/0x10 [ 1727.634915] __kmalloc+0x2ab/0x3c0 [ 1727.638435] ? __list_lru_init+0xd3/0x7f0 [ 1727.642669] __list_lru_init+0xd3/0x7f0 [ 1727.646648] ? up_write+0x18/0x150 [ 1727.650188] sget_userns+0x7e2/0xcd0 [ 1727.653900] ? set_bdev_super+0x110/0x110 [ 1727.658148] ? ns_test_super+0x50/0x50 [ 1727.662061] ? set_bdev_super+0x110/0x110 [ 1727.666303] ? ns_test_super+0x50/0x50 [ 1727.670172] sget+0x102/0x140 [ 1727.673273] mount_bdev+0xf8/0x3b0 [ 1727.677249] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1727.682354] mount_fs+0xa3/0x310 [ 1727.686142] vfs_kern_mount.part.0+0x68/0x470 [ 1727.690619] do_mount+0x113c/0x2f10 [ 1727.694238] ? cmp_ex_sort+0xc0/0xc0 [ 1727.697945] ? __do_page_fault+0x180/0xd60 [ 1727.702166] ? copy_mount_string+0x40/0x40 [ 1727.706384] ? memset+0x20/0x40 [ 1727.709658] ? copy_mount_options+0x26f/0x380 [ 1727.714138] ksys_mount+0xcf/0x130 [ 1727.717677] __x64_sys_mount+0xba/0x150 [ 1727.721635] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1727.726199] do_syscall_64+0xf9/0x620 [ 1727.729987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1727.735266] RIP: 0033:0x467afa [ 1727.738450] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1727.757343] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1727.765036] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1727.772361] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1727.779719] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1727.786974] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1727.794227] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 08:56:18 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:18 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:18 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:18 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000300)={0x47471c7f, 0xfffffffffffffffc, 0x57, 0x3, 0x9, 0x676, 0xe3e}, &(0x7f0000000340)={0x0, 0x6, 0x100000000, 0x400, 0x101, 0xc7a, 0xa, 0x4}, &(0x7f0000000380)={0xed2, 0xffffffffffffffe0, 0x20, 0x7, 0x3ff, 0x2, 0x7f, 0x4fe}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={[0xa79f]}, 0x8}) [ 1729.408584] FAULT_INJECTION: forcing a failure. [ 1729.408584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1729.421175] CPU: 0 PID: 27561 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1729.429074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1729.438497] Call Trace: [ 1729.441079] dump_stack+0x1fc/0x2ef [ 1729.444698] should_fail.cold+0xa/0xf [ 1729.448505] ? lock_acquire+0x170/0x3c0 [ 1729.452600] ? setup_fault_attr+0x200/0x200 [ 1729.456982] __alloc_pages_nodemask+0x239/0x2890 [ 1729.461848] ? __lock_acquire+0x6de/0x3ff0 [ 1729.466072] ? __lock_acquire+0x6de/0x3ff0 [ 1729.470297] ? __lock_acquire+0x6de/0x3ff0 [ 1729.474520] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1729.479365] ? __lock_acquire+0x6de/0x3ff0 [ 1729.483673] ? static_obj+0x50/0x50 [ 1729.487298] ? mark_held_locks+0xf0/0xf0 [ 1729.491370] alloc_pages_vma+0xf2/0x780 [ 1729.495335] shmem_alloc_page+0x11c/0x1f0 [ 1729.499467] ? shmem_swapin+0x220/0x220 [ 1729.503455] ? percpu_counter_add_batch+0x126/0x180 [ 1729.508464] ? __vm_enough_memory+0x316/0x650 [ 1729.512947] shmem_alloc_and_acct_page+0x15a/0x850 [ 1729.517872] shmem_getpage_gfp+0x4e9/0x37f0 [ 1729.522185] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1729.527272] ? mark_held_locks+0xa6/0xf0 [ 1729.531326] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1729.536536] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1729.541732] shmem_write_begin+0xff/0x1e0 [ 1729.545876] generic_perform_write+0x1f8/0x4d0 [ 1729.550466] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1729.555141] ? current_time+0x1c0/0x1c0 [ 1729.559201] ? lock_acquire+0x170/0x3c0 [ 1729.563173] __generic_file_write_iter+0x24b/0x610 [ 1729.568087] generic_file_write_iter+0x3f8/0x730 [ 1729.572844] __vfs_write+0x51b/0x770 [ 1729.576564] ? kernel_read+0x110/0x110 [ 1729.580635] ? check_preemption_disabled+0x41/0x280 [ 1729.585638] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1729.590651] vfs_write+0x1f3/0x540 [ 1729.594187] __x64_sys_pwrite64+0x1f7/0x250 [ 1729.598522] ? ksys_pwrite64+0x1a0/0x1a0 [ 1729.602591] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1729.607623] ? do_syscall_64+0x21/0x620 [ 1729.611589] do_syscall_64+0xf9/0x620 [ 1729.615391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.620570] RIP: 0033:0x419777 [ 1729.623838] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1729.642823] RSP: 002b:00007f5bb8374f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1729.650536] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1729.657808] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 1729.665248] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1729.672514] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1729.679782] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1729.717422] FAULT_INJECTION: forcing a failure. [ 1729.717422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1729.733569] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1729.742753] CPU: 1 PID: 27567 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1729.742765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1729.742771] Call Trace: [ 1729.742792] dump_stack+0x1fc/0x2ef [ 1729.742811] should_fail.cold+0xa/0xf [ 1729.742827] ? lock_acquire+0x170/0x3c0 [ 1729.742844] ? setup_fault_attr+0x200/0x200 [ 1729.742869] __alloc_pages_nodemask+0x239/0x2890 [ 1729.742883] ? pcpu_alloc+0x91f/0x1190 [ 1729.742899] ? mark_held_locks+0xf0/0xf0 [ 1729.742916] ? pcpu_alloc+0xe78/0x1190 [ 1729.742944] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1729.759059] EXT4-fs (loop3): group descriptors corrupted! [ 1729.760192] ? check_preemption_disabled+0x41/0x280 [ 1729.760219] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1729.815501] ? pcpu_alloc+0xc9/0x1190 [ 1729.819457] alloc_pages_current+0x193/0x2a0 [ 1729.823869] ? __lockdep_init_map+0x100/0x5a0 [ 1729.828361] get_zeroed_page+0x10/0x40 [ 1729.832355] mount_fs+0x203/0x310 [ 1729.835895] vfs_kern_mount.part.0+0x68/0x470 [ 1729.840381] do_mount+0x113c/0x2f10 [ 1729.844015] ? cmp_ex_sort+0xc0/0xc0 [ 1729.847727] ? __do_page_fault+0x180/0xd60 [ 1729.851948] ? copy_mount_string+0x40/0x40 [ 1729.856171] ? memset+0x20/0x40 [ 1729.859489] ? copy_mount_options+0x26f/0x380 [ 1729.863988] ksys_mount+0xcf/0x130 [ 1729.867532] __x64_sys_mount+0xba/0x150 [ 1729.871496] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1729.876179] do_syscall_64+0xf9/0x620 [ 1729.879967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.885137] RIP: 0033:0x467afa [ 1729.888329] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1729.907528] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1729.915234] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1729.922716] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1729.930071] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1729.937343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1729.944661] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:18 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:18 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:19 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1730.087318] FAULT_INJECTION: forcing a failure. [ 1730.087318] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.099143] CPU: 1 PID: 27591 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1730.107039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.116398] Call Trace: [ 1730.119001] dump_stack+0x1fc/0x2ef [ 1730.122641] should_fail.cold+0xa/0xf [ 1730.126466] ? setup_fault_attr+0x200/0x200 [ 1730.126816] FAULT_INJECTION: forcing a failure. [ 1730.126816] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.130822] ? lock_acquire+0x170/0x3c0 [ 1730.145975] __should_failslab+0x115/0x180 [ 1730.150219] should_failslab+0x5/0x10 [ 1730.154040] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1730.159133] __kmalloc_node+0x38/0x70 [ 1730.162922] kvmalloc_node+0x61/0xf0 [ 1730.166620] __list_lru_init+0x4c6/0x7f0 [ 1730.170667] ? up_read+0xf3/0x110 [ 1730.174122] sget_userns+0x7e2/0xcd0 [ 1730.177834] ? set_bdev_super+0x110/0x110 [ 1730.181968] ? ns_test_super+0x50/0x50 [ 1730.185840] ? set_bdev_super+0x110/0x110 [ 1730.189972] ? ns_test_super+0x50/0x50 [ 1730.193842] sget+0x102/0x140 [ 1730.196934] mount_bdev+0xf8/0x3b0 [ 1730.200494] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1730.205687] mount_fs+0xa3/0x310 [ 1730.209050] vfs_kern_mount.part.0+0x68/0x470 [ 1730.213555] do_mount+0x113c/0x2f10 [ 1730.217188] ? cmp_ex_sort+0xc0/0xc0 [ 1730.220888] ? __do_page_fault+0x180/0xd60 [ 1730.225108] ? copy_mount_string+0x40/0x40 [ 1730.229332] ? memset+0x20/0x40 [ 1730.232599] ? copy_mount_options+0x26f/0x380 [ 1730.237084] ksys_mount+0xcf/0x130 [ 1730.240613] __x64_sys_mount+0xba/0x150 [ 1730.244572] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1730.249140] do_syscall_64+0xf9/0x620 [ 1730.252931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.258103] RIP: 0033:0x467afa [ 1730.261290] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.280265] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1730.288044] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1730.295496] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1730.302749] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1730.310001] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1730.318012] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1730.325363] CPU: 0 PID: 27597 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 08:56:19 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) [ 1730.333263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.342621] Call Trace: [ 1730.345216] dump_stack+0x1fc/0x2ef [ 1730.348906] should_fail.cold+0xa/0xf [ 1730.352724] ? setup_fault_attr+0x200/0x200 [ 1730.357066] ? __lock_acquire+0x6de/0x3ff0 [ 1730.361758] __should_failslab+0x115/0x180 [ 1730.366105] should_failslab+0x5/0x10 [ 1730.370000] kmem_cache_alloc+0x3f/0x370 [ 1730.374088] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1730.379730] radix_tree_extend+0x191/0x4b0 [ 1730.383979] __radix_tree_create+0x448/0x540 [ 1730.388409] __radix_tree_insert+0xbb/0x5f0 [ 1730.392741] ? __radix_tree_create+0x540/0x540 [ 1730.397335] ? lock_acquire+0x170/0x3c0 [ 1730.401347] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1730.406296] shmem_add_to_page_cache+0x616/0xbb0 [ 1730.411068] ? shmem_recalc_inode+0x310/0x310 [ 1730.415585] ? __radix_tree_preload+0x1fe/0x280 [ 1730.420270] shmem_getpage_gfp+0x2004/0x37f0 [ 1730.424680] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1730.430056] ? mark_held_locks+0xa6/0xf0 [ 1730.434538] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1730.439833] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1730.445016] shmem_write_begin+0xff/0x1e0 [ 1730.449153] generic_perform_write+0x1f8/0x4d0 [ 1730.453745] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1730.458745] ? current_time+0x1c0/0x1c0 [ 1730.462723] ? lock_acquire+0x170/0x3c0 [ 1730.466773] __generic_file_write_iter+0x24b/0x610 [ 1730.471796] generic_file_write_iter+0x3f8/0x730 [ 1730.476540] __vfs_write+0x51b/0x770 [ 1730.480243] ? kernel_read+0x110/0x110 [ 1730.484132] ? check_preemption_disabled+0x41/0x280 [ 1730.489144] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1730.494159] vfs_write+0x1f3/0x540 [ 1730.497688] __x64_sys_pwrite64+0x1f7/0x250 [ 1730.501998] ? ksys_pwrite64+0x1a0/0x1a0 [ 1730.506058] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1730.511058] ? do_syscall_64+0x21/0x620 [ 1730.515032] do_syscall_64+0xf9/0x620 [ 1730.518820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.523992] RIP: 0033:0x419777 [ 1730.527261] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1730.546155] RSP: 002b:00007f5bb8374f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1730.554104] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1730.561464] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 1730.568778] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1730.576028] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 08:56:19 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1730.583289] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1730.631749] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1730.648965] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1730.666040] EXT4-fs (loop3): mount failed 08:56:19 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1730.710535] FAULT_INJECTION: forcing a failure. [ 1730.710535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1730.722496] CPU: 1 PID: 27616 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1730.730396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.739761] Call Trace: [ 1730.742371] dump_stack+0x1fc/0x2ef [ 1730.746015] should_fail.cold+0xa/0xf [ 1730.749828] ? setup_fault_attr+0x200/0x200 [ 1730.754158] ? get_page_from_freelist+0x1d60/0x4170 [ 1730.759173] ? bad_range+0x260/0x3c0 [ 1730.762978] __alloc_pages_nodemask+0x239/0x2890 [ 1730.767865] ? kernel_poison_pages+0x2c/0x2a0 [ 1730.772358] ? get_page_from_freelist+0x1d01/0x4170 [ 1730.777483] ? preempt_count_add+0xaf/0x190 [ 1730.781820] ? __lock_acquire+0x6de/0x3ff0 [ 1730.786108] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1730.791070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.796437] ? should_fail+0x142/0x7b0 [ 1730.800324] ? lock_acquire+0x170/0x3c0 [ 1730.804302] ? check_preemption_disabled+0x41/0x280 [ 1730.809408] cache_grow_begin+0xa4/0x8a0 [ 1730.813569] ? setup_fault_attr+0x200/0x200 [ 1730.817894] ? lock_acquire+0x170/0x3c0 [ 1730.821883] cache_alloc_refill+0x273/0x340 [ 1730.826207] kmem_cache_alloc+0x346/0x370 [ 1730.830345] getname_kernel+0x4e/0x370 [ 1730.834220] kern_path+0x1b/0x40 [ 1730.837761] lookup_bdev+0xfc/0x220 [ 1730.841525] ? bd_acquire+0x440/0x440 [ 1730.845337] blkdev_get_by_path+0x1b/0xd0 [ 1730.849480] mount_bdev+0x5b/0x3b0 [ 1730.853022] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1730.858125] mount_fs+0xa3/0x310 [ 1730.861496] vfs_kern_mount.part.0+0x68/0x470 [ 1730.866111] do_mount+0x113c/0x2f10 [ 1730.869753] ? cmp_ex_sort+0xc0/0xc0 [ 1730.873506] ? __do_page_fault+0x180/0xd60 [ 1730.877746] ? copy_mount_string+0x40/0x40 [ 1730.882008] ? memset+0x20/0x40 [ 1730.885465] ? copy_mount_options+0x26f/0x380 [ 1730.889966] ksys_mount+0xcf/0x130 [ 1730.893747] __x64_sys_mount+0xba/0x150 [ 1730.897831] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1730.902446] do_syscall_64+0xf9/0x620 [ 1730.906263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.911449] RIP: 0033:0x467afa [ 1730.914643] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.933531] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1730.941239] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1730.948505] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1730.955853] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1730.963249] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1730.970516] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1731.015090] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1731.036894] FAULT_INJECTION: forcing a failure. [ 1731.036894] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1731.051789] CPU: 1 PID: 27627 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1731.059695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1731.069053] Call Trace: [ 1731.071652] dump_stack+0x1fc/0x2ef [ 1731.075296] should_fail.cold+0xa/0xf [ 1731.079107] ? lock_acquire+0x170/0x3c0 [ 1731.083097] ? setup_fault_attr+0x200/0x200 [ 1731.087555] __alloc_pages_nodemask+0x239/0x2890 [ 1731.092471] ? __lock_acquire+0x6de/0x3ff0 [ 1731.096748] ? check_preemption_disabled+0x41/0x280 [ 1731.101868] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1731.106904] ? __lock_acquire+0x6de/0x3ff0 [ 1731.111166] ? radix_tree_node_alloc.constprop.0+0x1b8/0x320 [ 1731.117209] ? mark_held_locks+0xf0/0xf0 [ 1731.121421] ? radix_tree_extend+0x3d8/0x4b0 [ 1731.125850] alloc_pages_vma+0xf2/0x780 [ 1731.129840] shmem_alloc_page+0x11c/0x1f0 [ 1731.134263] ? shmem_swapin+0x220/0x220 [ 1731.138274] ? percpu_counter_add_batch+0x126/0x180 [ 1731.143307] ? __vm_enough_memory+0x316/0x650 [ 1731.147821] shmem_alloc_and_acct_page+0x15a/0x850 [ 1731.152772] shmem_getpage_gfp+0x4e9/0x37f0 [ 1731.157121] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1731.162239] ? mark_held_locks+0xa6/0xf0 [ 1731.166306] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1731.171505] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1731.176714] shmem_write_begin+0xff/0x1e0 [ 1731.180879] generic_perform_write+0x1f8/0x4d0 [ 1731.185483] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1731.190162] ? current_time+0x1c0/0x1c0 [ 1731.194154] ? lock_acquire+0x170/0x3c0 [ 1731.198141] __generic_file_write_iter+0x24b/0x610 [ 1731.203095] generic_file_write_iter+0x3f8/0x730 [ 1731.207865] __vfs_write+0x51b/0x770 [ 1731.211590] ? kernel_read+0x110/0x110 [ 1731.215638] ? check_preemption_disabled+0x41/0x280 [ 1731.219036] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1731.220666] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1731.220686] vfs_write+0x1f3/0x540 [ 1731.220706] __x64_sys_pwrite64+0x1f7/0x250 [ 1731.220719] ? ksys_pwrite64+0x1a0/0x1a0 [ 1731.220737] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1731.239111] EXT4-fs (loop5): mount failed [ 1731.242570] ? do_syscall_64+0x21/0x620 [ 1731.242588] do_syscall_64+0xf9/0x620 [ 1731.242610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1731.242621] RIP: 0033:0x419777 [ 1731.242634] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1731.242640] RSP: 002b:00007f5bb8374f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1731.242652] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 1731.242659] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 1731.242666] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 1731.242673] R10: 0000000000004400 R11: 0000000000000293 R12: 0000000000000004 [ 1731.242680] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 1731.297946] EXT4-fs error (device loop3): ext4_fill_super:4443: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1731.353134] ieee802154 phy0 wpan0: encryption failed: -22 [ 1731.368103] EXT4-fs (loop3): get root inode failed [ 1731.375987] EXT4-fs (loop3): mount failed 08:56:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 08:56:21 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:21 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x3, 0x9}, 0x40170, 0x6, 0x800, 0x8, 0x2, 0x10001, 0x6, 0x0, 0x1ff, 0x0, 0xa3c}, r6, 0x7, 0xffffffffffffffff, 0x0) 08:56:21 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:21 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1732.443629] FAULT_INJECTION: forcing a failure. [ 1732.443629] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.457172] CPU: 0 PID: 27651 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1732.465094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.474630] Call Trace: [ 1732.477409] dump_stack+0x1fc/0x2ef [ 1732.481056] should_fail.cold+0xa/0xf [ 1732.484867] ? setup_fault_attr+0x200/0x200 [ 1732.489199] ? lock_acquire+0x170/0x3c0 08:56:21 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1732.493210] __should_failslab+0x115/0x180 [ 1732.497473] should_failslab+0x5/0x10 [ 1732.501385] kmem_cache_alloc+0x277/0x370 [ 1732.505547] getname_flags+0xce/0x590 [ 1732.509367] do_sys_open+0x26c/0x520 [ 1732.513092] ? filp_open+0x70/0x70 [ 1732.516652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1732.522033] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1732.527080] ? do_syscall_64+0x21/0x620 [ 1732.531073] do_syscall_64+0xf9/0x620 [ 1732.535370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.540862] RIP: 0033:0x4196c4 [ 1732.544408] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1732.564064] RSP: 002b:00007f5bb8374ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1732.564078] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1732.564084] RDX: 0000000000000002 RSI: 00007f5bb8375000 RDI: 00000000ffffff9c 08:56:21 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1732.564091] RBP: 00007f5bb8375000 R08: 0000000000000000 R09: ffffffffffffffff [ 1732.564097] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1732.564103] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1732.637199] FAULT_INJECTION: forcing a failure. [ 1732.637199] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.667365] CPU: 0 PID: 27654 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1732.675373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.679221] FAULT_INJECTION: forcing a failure. [ 1732.679221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1732.684737] Call Trace: [ 1732.699152] dump_stack+0x1fc/0x2ef [ 1732.702780] should_fail.cold+0xa/0xf [ 1732.706570] ? setup_fault_attr+0x200/0x200 [ 1732.710884] ? lock_acquire+0x170/0x3c0 [ 1732.714853] __should_failslab+0x115/0x180 [ 1732.719078] should_failslab+0x5/0x10 [ 1732.722869] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1732.728075] __kmalloc_node+0x38/0x70 [ 1732.731885] kvmalloc_node+0x61/0xf0 [ 1732.735597] __list_lru_init+0x4c6/0x7f0 [ 1732.739661] ? up_read+0xf3/0x110 [ 1732.743106] sget_userns+0x7e2/0xcd0 [ 1732.746808] ? set_bdev_super+0x110/0x110 [ 1732.751032] ? ns_test_super+0x50/0x50 [ 1732.754908] ? set_bdev_super+0x110/0x110 [ 1732.759130] ? ns_test_super+0x50/0x50 [ 1732.763022] sget+0x102/0x140 [ 1732.766221] mount_bdev+0xf8/0x3b0 [ 1732.769747] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1732.774837] mount_fs+0xa3/0x310 [ 1732.778205] vfs_kern_mount.part.0+0x68/0x470 [ 1732.782697] do_mount+0x113c/0x2f10 [ 1732.786314] ? cmp_ex_sort+0xc0/0xc0 [ 1732.790014] ? __do_page_fault+0x180/0xd60 [ 1732.794245] ? copy_mount_string+0x40/0x40 [ 1732.798484] ? memset+0x20/0x40 [ 1732.801755] ? copy_mount_options+0x26f/0x380 [ 1732.806255] ksys_mount+0xcf/0x130 [ 1732.809798] __x64_sys_mount+0xba/0x150 [ 1732.813762] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1732.818349] do_syscall_64+0xf9/0x620 [ 1732.822139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.827338] RIP: 0033:0x467afa [ 1732.830520] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1732.849426] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1732.857142] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1732.864395] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1732.871665] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1732.878939] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1732.886366] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1732.893645] CPU: 1 PID: 27675 Comm: syz-executor.3 Not tainted 4.19.197-syzkaller #0 [ 1732.901549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.911087] Call Trace: [ 1732.913778] dump_stack+0x1fc/0x2ef [ 1732.917682] should_fail.cold+0xa/0xf [ 1732.921500] ? setup_fault_attr+0x200/0x200 [ 1732.925839] ? do_writepages+0x290/0x290 [ 1732.928646] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1732.929937] ? unlock_page+0x13d/0x230 [ 1732.929963] __alloc_pages_nodemask+0x239/0x2890 [ 1732.929987] ? generic_perform_write+0x36c/0x4d0 [ 1732.951364] ? __lock_acquire+0x6de/0x3ff0 [ 1732.955820] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1732.960920] ? lock_downgrade+0x720/0x720 [ 1732.965079] ? lock_acquire+0x170/0x3c0 [ 1732.969182] ? up_write+0x18/0x150 [ 1732.972719] ? generic_file_write_iter+0x381/0x730 [ 1732.977718] cache_grow_begin+0xa4/0x8a0 [ 1732.981894] ? setup_fault_attr+0x200/0x200 [ 1732.986207] ? lock_acquire+0x170/0x3c0 [ 1732.990169] cache_alloc_refill+0x273/0x340 [ 1732.994494] kmem_cache_alloc+0x346/0x370 [ 1732.998767] getname_flags+0xce/0x590 [ 1733.002569] do_sys_open+0x26c/0x520 [ 1733.006301] ? filp_open+0x70/0x70 [ 1733.009833] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1733.015305] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1733.020322] ? do_syscall_64+0x21/0x620 [ 1733.024286] do_syscall_64+0xf9/0x620 [ 1733.028121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.033334] RIP: 0033:0x4196c4 [ 1733.036523] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1733.055441] RSP: 002b:00007f5bb8374ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1733.063157] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 1733.070549] RDX: 0000000000000002 RSI: 00007f5bb8375000 RDI: 00000000ffffff9c [ 1733.077942] RBP: 00007f5bb8375000 R08: 0000000000000000 R09: ffffffffffffffff [ 1733.085205] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1733.092468] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 08:56:22 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:22 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1733.172207] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1733.201289] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1733.240310] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1733.258701] EXT4-fs (loop3): mount failed 08:56:22 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) r9 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000b00)=ANY=[@ANYBLOB="4c0300001b0000082cbd7000ffdbdf25fe800000000000aaac1e0101000000000000000000000000412200004e240008020020208700"/64, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) [ 1733.316477] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1733.320725] FAULT_INJECTION: forcing a failure. [ 1733.320725] name failslab, interval 1, probability 0, space 0, times 0 [ 1733.335473] CPU: 1 PID: 27688 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1733.343468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.352827] Call Trace: [ 1733.355422] dump_stack+0x1fc/0x2ef [ 1733.359046] should_fail.cold+0xa/0xf [ 1733.362850] ? setup_fault_attr+0x200/0x200 [ 1733.367176] ? lock_acquire+0x170/0x3c0 [ 1733.371217] __should_failslab+0x115/0x180 [ 1733.375456] should_failslab+0x5/0x10 [ 1733.379249] __kmalloc+0x2ab/0x3c0 [ 1733.382785] ? __list_lru_init+0xd3/0x7f0 [ 1733.386954] __list_lru_init+0xd3/0x7f0 [ 1733.390927] ? up_write+0x18/0x150 [ 1733.394546] sget_userns+0x7e2/0xcd0 [ 1733.398257] ? set_bdev_super+0x110/0x110 [ 1733.402403] ? ns_test_super+0x50/0x50 [ 1733.406285] ? set_bdev_super+0x110/0x110 [ 1733.410439] ? ns_test_super+0x50/0x50 [ 1733.414535] sget+0x102/0x140 [ 1733.417726] mount_bdev+0xf8/0x3b0 [ 1733.421365] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1733.426463] mount_fs+0xa3/0x310 [ 1733.429877] vfs_kern_mount.part.0+0x68/0x470 [ 1733.434424] do_mount+0x113c/0x2f10 [ 1733.438041] ? cmp_ex_sort+0xc0/0xc0 [ 1733.441761] ? __do_page_fault+0x180/0xd60 [ 1733.446267] ? copy_mount_string+0x40/0x40 [ 1733.452324] ? memset+0x20/0x40 [ 1733.455697] ? copy_mount_options+0x26f/0x380 [ 1733.460186] ksys_mount+0xcf/0x130 [ 1733.463716] __x64_sys_mount+0xba/0x150 [ 1733.467783] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1733.472355] do_syscall_64+0xf9/0x620 [ 1733.476209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.481396] RIP: 0033:0x467afa [ 1733.484575] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1733.503559] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1733.511956] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1733.519222] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1733.526486] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1733.533756] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1733.541032] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1733.582619] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1733.686746] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1733.710623] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1733.746075] EXT4-fs (loop3): mount failed 08:56:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 08:56:24 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:24 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:24 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) geteuid() [ 1735.499619] FAULT_INJECTION: forcing a failure. [ 1735.499619] name failslab, interval 1, probability 0, space 0, times 0 [ 1735.519920] CPU: 0 PID: 27727 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1735.527855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1735.529967] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1735.537213] Call Trace: [ 1735.537256] dump_stack+0x1fc/0x2ef [ 1735.537277] should_fail.cold+0xa/0xf [ 1735.537294] ? setup_fault_attr+0x200/0x200 [ 1735.537309] ? lock_acquire+0x170/0x3c0 [ 1735.537327] __should_failslab+0x115/0x180 [ 1735.567558] should_failslab+0x5/0x10 [ 1735.571537] __kmalloc+0x2ab/0x3c0 [ 1735.575429] ? prealloc_shrinker+0x15d/0x340 [ 1735.579830] prealloc_shrinker+0x15d/0x340 [ 1735.584056] sget_userns+0x7b4/0xcd0 [ 1735.587773] ? set_bdev_super+0x110/0x110 [ 1735.591909] ? ns_test_super+0x50/0x50 [ 1735.595939] ? set_bdev_super+0x110/0x110 [ 1735.600071] ? ns_test_super+0x50/0x50 [ 1735.604007] sget+0x102/0x140 [ 1735.607187] mount_bdev+0xf8/0x3b0 [ 1735.610713] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1735.615824] mount_fs+0xa3/0x310 [ 1735.619180] vfs_kern_mount.part.0+0x68/0x470 [ 1735.623709] do_mount+0x113c/0x2f10 [ 1735.627329] ? cmp_ex_sort+0xc0/0xc0 [ 1735.631052] ? __do_page_fault+0x180/0xd60 [ 1735.635619] ? copy_mount_string+0x40/0x40 [ 1735.639842] ? memset+0x20/0x40 [ 1735.643126] ? copy_mount_options+0x26f/0x380 [ 1735.647619] ksys_mount+0xcf/0x130 [ 1735.651157] __x64_sys_mount+0xba/0x150 [ 1735.655145] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1735.659714] do_syscall_64+0xf9/0x620 [ 1735.663536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1735.668720] RIP: 0033:0x467afa [ 1735.671897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1735.691130] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1735.699110] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1735.706537] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1735.713802] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1735.721071] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1735.728336] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:24 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1735.807538] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1735.823089] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1735.839145] EXT4-fs (loop3): mount failed 08:56:24 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:24 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1735.948188] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1735.986040] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1735.997937] FAULT_INJECTION: forcing a failure. [ 1735.997937] name failslab, interval 1, probability 0, space 0, times 0 [ 1736.005290] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1736.015796] CPU: 1 PID: 27764 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1736.030669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1736.040042] Call Trace: [ 1736.042740] dump_stack+0x1fc/0x2ef [ 1736.046530] should_fail.cold+0xa/0xf [ 1736.049249] EXT4-fs (loop3): mount failed [ 1736.050444] ? setup_fault_attr+0x200/0x200 [ 1736.058908] ? lock_acquire+0x170/0x3c0 [ 1736.062901] __should_failslab+0x115/0x180 [ 1736.067147] should_failslab+0x5/0x10 [ 1736.070957] __kmalloc+0x2ab/0x3c0 [ 1736.074504] ? __list_lru_init+0xd3/0x7f0 [ 1736.078668] __list_lru_init+0xd3/0x7f0 [ 1736.082651] ? up_read+0xf3/0x110 [ 1736.086151] sget_userns+0x810/0xcd0 [ 1736.089873] ? set_bdev_super+0x110/0x110 [ 1736.094044] ? ns_test_super+0x50/0x50 [ 1736.096110] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1736.097936] ? set_bdev_super+0x110/0x110 [ 1736.109271] ? ns_test_super+0x50/0x50 [ 1736.113175] sget+0x102/0x140 [ 1736.116334] mount_bdev+0xf8/0x3b0 [ 1736.119986] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1736.125105] mount_fs+0xa3/0x310 [ 1736.128625] vfs_kern_mount.part.0+0x68/0x470 [ 1736.133135] do_mount+0x113c/0x2f10 [ 1736.136752] ? cmp_ex_sort+0xc0/0xc0 [ 1736.140453] ? __do_page_fault+0x180/0xd60 [ 1736.144811] ? copy_mount_string+0x40/0x40 [ 1736.149130] ? memset+0x20/0x40 [ 1736.152568] ? copy_mount_options+0x26f/0x380 [ 1736.157058] ksys_mount+0xcf/0x130 [ 1736.160588] __x64_sys_mount+0xba/0x150 [ 1736.164744] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1736.169400] do_syscall_64+0xf9/0x620 [ 1736.173190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1736.178565] RIP: 0033:0x467afa [ 1736.181761] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1736.200681] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1736.208558] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1736.215818] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1736.223074] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1736.230445] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1736.237822] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:25 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1736.347541] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1736.400967] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1736.402362] FAULT_INJECTION: forcing a failure. [ 1736.402362] name failslab, interval 1, probability 0, space 0, times 0 [ 1736.428850] CPU: 0 PID: 27786 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1736.436803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1736.446166] Call Trace: [ 1736.448773] dump_stack+0x1fc/0x2ef [ 1736.452477] should_fail.cold+0xa/0xf [ 1736.456388] ? setup_fault_attr+0x200/0x200 [ 1736.460727] ? lock_acquire+0x170/0x3c0 [ 1736.464717] __should_failslab+0x115/0x180 [ 1736.468973] should_failslab+0x5/0x10 [ 1736.472795] kmem_cache_alloc_trace+0x284/0x380 [ 1736.477494] ? set_bdev_super+0x110/0x110 [ 1736.481651] ? ns_test_super+0x50/0x50 [ 1736.485561] sget_userns+0x122/0xcd0 [ 1736.489285] ? set_bdev_super+0x110/0x110 [ 1736.493448] ? ns_test_super+0x50/0x50 [ 1736.497447] ? set_bdev_super+0x110/0x110 [ 1736.501068] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1736.501586] ? ns_test_super+0x50/0x50 [ 1736.501600] sget+0x102/0x140 [ 1736.501615] mount_bdev+0xf8/0x3b0 [ 1736.525480] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1736.530739] mount_fs+0xa3/0x310 [ 1736.534127] vfs_kern_mount.part.0+0x68/0x470 [ 1736.538644] do_mount+0x113c/0x2f10 [ 1736.540160] EXT4-fs (loop3): mount failed [ 1736.542295] ? cmp_ex_sort+0xc0/0xc0 [ 1736.542313] ? __do_page_fault+0x180/0xd60 [ 1736.542328] ? copy_mount_string+0x40/0x40 [ 1736.542350] ? memset+0x20/0x40 [ 1736.542366] ? copy_mount_options+0x26f/0x380 [ 1736.542385] ksys_mount+0xcf/0x130 [ 1736.570507] __x64_sys_mount+0xba/0x150 [ 1736.574514] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1736.579207] do_syscall_64+0xf9/0x620 [ 1736.583015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1736.588327] RIP: 0033:0x467afa [ 1736.591505] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1736.610881] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1736.618600] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1736.625883] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1736.633140] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1736.640406] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:56:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:25 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r8, 0x0) [ 1736.647762] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1736.750321] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1736.768737] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1736.783960] EXT4-fs (loop3): mount failed 08:56:27 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:27 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:27 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x8, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:27 executing program 2 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1738.574771] FAULT_INJECTION: forcing a failure. [ 1738.574771] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.576726] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1738.608167] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1738.617325] CPU: 0 PID: 27824 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1738.621885] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1738.625896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1738.625903] Call Trace: [ 1738.625928] dump_stack+0x1fc/0x2ef [ 1738.625948] should_fail.cold+0xa/0xf [ 1738.644917] EXT4-fs (loop3): mount failed [ 1738.648564] ? setup_fault_attr+0x200/0x200 [ 1738.648581] ? lock_acquire+0x170/0x3c0 [ 1738.648604] __should_failslab+0x115/0x180 [ 1738.675498] should_failslab+0x5/0x10 [ 1738.679317] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1738.684518] __kmalloc_node+0x38/0x70 [ 1738.688318] kvmalloc_node+0x61/0xf0 [ 1738.692179] __list_lru_init+0x4c6/0x7f0 [ 1738.696274] ? up_read+0xf3/0x110 [ 1738.699717] sget_userns+0x810/0xcd0 [ 1738.703428] ? set_bdev_super+0x110/0x110 [ 1738.707576] ? ns_test_super+0x50/0x50 [ 1738.711454] ? set_bdev_super+0x110/0x110 [ 1738.715695] ? ns_test_super+0x50/0x50 [ 1738.719569] sget+0x102/0x140 [ 1738.722663] mount_bdev+0xf8/0x3b0 [ 1738.726431] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1738.731624] mount_fs+0xa3/0x310 [ 1738.735043] vfs_kern_mount.part.0+0x68/0x470 [ 1738.739762] do_mount+0x113c/0x2f10 [ 1738.743420] ? cmp_ex_sort+0xc0/0xc0 [ 1738.747135] ? __do_page_fault+0x180/0xd60 [ 1738.751459] ? copy_mount_string+0x40/0x40 [ 1738.755812] ? memset+0x20/0x40 [ 1738.759106] ? copy_mount_options+0x26f/0x380 [ 1738.763599] ksys_mount+0xcf/0x130 [ 1738.767139] __x64_sys_mount+0xba/0x150 [ 1738.771115] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1738.775691] do_syscall_64+0xf9/0x620 [ 1738.779546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1738.784982] RIP: 0033:0x467afa [ 1738.788172] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.807167] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1738.815216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1738.822641] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1738.829910] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1738.837182] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1738.844443] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1738.900303] FAT-fs (loop1): Unrecognized mount option "sho" or missing value 08:56:27 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x48, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:27 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1738.986082] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1739.001739] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1739.019344] EXT4-fs (loop3): mount failed [ 1739.083502] FAULT_INJECTION: forcing a failure. [ 1739.083502] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.084940] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1739.099969] CPU: 0 PID: 27861 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1739.110181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1739.119544] Call Trace: [ 1739.122249] dump_stack+0x1fc/0x2ef [ 1739.126070] should_fail.cold+0xa/0xf [ 1739.129887] ? setup_fault_attr+0x200/0x200 [ 1739.134232] __should_failslab+0x115/0x180 [ 1739.138574] should_failslab+0x5/0x10 [ 1739.142433] kmem_cache_alloc+0x3f/0x370 [ 1739.146511] ? mempool_alloc+0x350/0x350 [ 1739.150575] mempool_alloc+0x146/0x350 [ 1739.154472] ? mempool_resize+0x790/0x790 [ 1739.158649] ? lock_downgrade+0x720/0x720 [ 1739.162783] ? mark_held_locks+0xa6/0xf0 [ 1739.166879] bio_alloc_bioset+0x389/0x5e0 [ 1739.172765] ? __find_get_block+0x314/0xde0 [ 1739.177224] ? bvec_alloc+0x2f0/0x2f0 [ 1739.181019] ? __getblk_slow+0x6a3/0x9e0 [ 1739.185155] submit_bh_wbc+0x141/0x760 [ 1739.189032] __bread_gfp+0x14e/0x300 [ 1739.192868] ext4_fill_super+0x57b/0xc7f0 [ 1739.197252] ? vsnprintf+0x2cc/0x14f0 [ 1739.201299] ? pointer+0x850/0x850 [ 1739.204835] ? lock_downgrade+0x720/0x720 [ 1739.210156] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1739.215257] ? snprintf+0xbb/0xf0 [ 1739.218726] ? vsprintf+0x30/0x30 [ 1739.222211] ? wait_for_completion_io+0x10/0x10 [ 1739.226866] ? set_blocksize+0x163/0x3f0 [ 1739.230916] mount_bdev+0x2fc/0x3b0 [ 1739.234575] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1739.239850] mount_fs+0xa3/0x310 [ 1739.243225] vfs_kern_mount.part.0+0x68/0x470 [ 1739.247707] do_mount+0x113c/0x2f10 [ 1739.251324] ? cmp_ex_sort+0xc0/0xc0 [ 1739.255039] ? __do_page_fault+0x180/0xd60 [ 1739.259276] ? copy_mount_string+0x40/0x40 [ 1739.263502] ? memset+0x20/0x40 [ 1739.266767] ? copy_mount_options+0x26f/0x380 [ 1739.271379] ksys_mount+0xcf/0x130 [ 1739.275076] __x64_sys_mount+0xba/0x150 [ 1739.279042] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1739.283620] do_syscall_64+0xf9/0x620 [ 1739.287423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.292704] RIP: 0033:0x467afa [ 1739.295906] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.314802] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1739.322676] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1739.330104] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1739.337367] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1739.344664] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1739.351920] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1739.375253] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1739.386164] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:56:28 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) [ 1739.416816] EXT4-fs (loop5): mount failed [ 1739.468000] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1739.482788] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1739.498550] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1739.514703] EXT4-fs (loop3): mount failed 08:56:28 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1739.596555] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1739.612829] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1739.633566] EXT4-fs (loop3): mount failed [ 1739.637971] FAULT_INJECTION: forcing a failure. [ 1739.637971] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.650779] CPU: 1 PID: 27891 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1739.658681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1739.668034] Call Trace: [ 1739.670642] dump_stack+0x1fc/0x2ef [ 1739.674267] should_fail.cold+0xa/0xf [ 1739.678083] ? setup_fault_attr+0x200/0x200 [ 1739.682406] ? lock_acquire+0x170/0x3c0 [ 1739.686476] __should_failslab+0x115/0x180 [ 1739.690707] should_failslab+0x5/0x10 [ 1739.694503] __kmalloc_track_caller+0x2a6/0x3c0 [ 1739.699169] ? ext4_fill_super+0xda/0xc7f0 [ 1739.703419] kstrdup+0x36/0x70 [ 1739.706625] ext4_fill_super+0xda/0xc7f0 [ 1739.710679] ? enable_ptr_key_workfn+0x30/0x30 [ 1739.715304] ? vsnprintf+0x2cc/0x14f0 [ 1739.719224] ? pointer+0x850/0x850 [ 1739.722844] ? lock_downgrade+0x720/0x720 [ 1739.727149] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1739.732468] ? snprintf+0xbb/0xf0 [ 1739.735923] ? vsprintf+0x30/0x30 [ 1739.739390] ? wait_for_completion_io+0x10/0x10 08:56:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:28 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1739.744252] ? set_blocksize+0x163/0x3f0 [ 1739.748328] mount_bdev+0x2fc/0x3b0 [ 1739.752088] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1739.757974] mount_fs+0xa3/0x310 [ 1739.761350] vfs_kern_mount.part.0+0x68/0x470 [ 1739.765859] do_mount+0x113c/0x2f10 [ 1739.769499] ? cmp_ex_sort+0xc0/0xc0 [ 1739.773224] ? __do_page_fault+0x180/0xd60 [ 1739.777457] ? copy_mount_string+0x40/0x40 [ 1739.781793] ? memset+0x20/0x40 [ 1739.785060] ? copy_mount_options+0x26f/0x380 [ 1739.789744] ksys_mount+0xcf/0x130 [ 1739.793286] __x64_sys_mount+0xba/0x150 [ 1739.797257] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1739.801950] do_syscall_64+0xf9/0x620 [ 1739.805758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.810939] RIP: 0033:0x467afa [ 1739.814132] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.833165] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1739.840884] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1739.848287] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1739.855544] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1739.862808] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1739.870064] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:28 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1739.954461] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1740.020468] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1740.027725] FAULT_INJECTION: forcing a failure. [ 1740.027725] name failslab, interval 1, probability 0, space 0, times 0 [ 1740.027745] CPU: 1 PID: 27913 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1740.027754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1740.027760] Call Trace: [ 1740.027779] dump_stack+0x1fc/0x2ef [ 1740.027798] should_fail.cold+0xa/0xf [ 1740.027820] ? setup_fault_attr+0x200/0x200 [ 1740.070734] ? lock_acquire+0x170/0x3c0 [ 1740.074743] __should_failslab+0x115/0x180 [ 1740.078984] should_failslab+0x5/0x10 [ 1740.082794] __kmalloc_track_caller+0x2a6/0x3c0 [ 1740.087452] ? ext4_fill_super+0xda/0xc7f0 [ 1740.091680] kstrdup+0x36/0x70 [ 1740.094864] ext4_fill_super+0xda/0xc7f0 [ 1740.098911] ? enable_ptr_key_workfn+0x30/0x30 [ 1740.103501] ? vsnprintf+0x2cc/0x14f0 [ 1740.107292] ? pointer+0x850/0x850 [ 1740.110837] ? lock_downgrade+0x720/0x720 [ 1740.115680] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1740.120769] ? snprintf+0xbb/0xf0 [ 1740.124206] ? vsprintf+0x30/0x30 [ 1740.127647] ? wait_for_completion_io+0x10/0x10 [ 1740.132320] ? set_blocksize+0x163/0x3f0 [ 1740.136373] mount_bdev+0x2fc/0x3b0 [ 1740.140001] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1740.145255] mount_fs+0xa3/0x310 [ 1740.148706] vfs_kern_mount.part.0+0x68/0x470 [ 1740.153209] do_mount+0x113c/0x2f10 [ 1740.156843] ? cmp_ex_sort+0xc0/0xc0 [ 1740.160566] ? __do_page_fault+0x180/0xd60 [ 1740.164800] ? copy_mount_string+0x40/0x40 [ 1740.169028] ? memset+0x20/0x40 [ 1740.172292] ? copy_mount_options+0x26f/0x380 [ 1740.176862] ksys_mount+0xcf/0x130 [ 1740.180475] __x64_sys_mount+0xba/0x150 [ 1740.184434] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1740.189000] do_syscall_64+0xf9/0x620 [ 1740.192789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1740.197959] RIP: 0033:0x467afa [ 1740.201138] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:56:29 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x68, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1740.220455] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1740.228156] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1740.235409] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1740.242679] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1740.249929] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1740.257271] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:29 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) [ 1740.295704] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1740.323373] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1740.367517] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1740.371342] EXT4-fs (loop3): mount failed [ 1740.435959] FAT-fs (loop1): Unrecognized mount option "sho" or missing value 08:56:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:30 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:30 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:30 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000000140)=r6, 0x12) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) [ 1741.609444] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1741.623635] FAULT_INJECTION: forcing a failure. [ 1741.623635] name failslab, interval 1, probability 0, space 0, times 0 [ 1741.646515] CPU: 1 PID: 27954 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1741.648106] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1741.654458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1741.654464] Call Trace: [ 1741.654489] dump_stack+0x1fc/0x2ef [ 1741.654509] should_fail.cold+0xa/0xf [ 1741.654525] ? ksys_mount+0xcf/0x130 [ 1741.654544] ? setup_fault_attr+0x200/0x200 [ 1741.662185] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:56:30 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x74, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1741.671253] ? blk_queue_enter+0x40b/0xb70 [ 1741.671277] __should_failslab+0x115/0x180 [ 1741.671294] should_failslab+0x5/0x10 [ 1741.671307] kmem_cache_alloc_node+0x54/0x3b0 [ 1741.671324] create_task_io_context+0x2c/0x430 [ 1741.674415] EXT4-fs (loop3): mount failed [ 1741.677506] generic_make_request_checks+0x1c4f/0x22e0 [ 1741.677527] ? should_fail_bio.isra.0+0xa0/0xa0 [ 1741.677544] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1741.748037] ? kmem_cache_alloc+0x315/0x370 [ 1741.752385] generic_make_request+0x23f/0xdf0 [ 1741.756995] ? blk_put_request+0x110/0x110 [ 1741.761243] ? lock_downgrade+0x720/0x720 [ 1741.765500] submit_bio+0xb1/0x430 [ 1741.769056] ? generic_make_request+0xdf0/0xdf0 [ 1741.773750] ? check_preemption_disabled+0x41/0x280 [ 1741.773770] ? guard_bio_eod+0x2a0/0x650 [ 1741.773788] submit_bh_wbc+0x5a7/0x760 [ 1741.786746] __bread_gfp+0x14e/0x300 [ 1741.790484] ext4_fill_super+0x57b/0xc7f0 [ 1741.794647] ? vsnprintf+0x2cc/0x14f0 [ 1741.798437] ? pointer+0x850/0x850 [ 1741.801998] ? lock_downgrade+0x720/0x720 [ 1741.806235] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1741.811335] ? snprintf+0xbb/0xf0 [ 1741.814867] ? vsprintf+0x30/0x30 [ 1741.818337] ? wait_for_completion_io+0x10/0x10 [ 1741.822988] ? set_blocksize+0x163/0x3f0 [ 1741.827044] mount_bdev+0x2fc/0x3b0 [ 1741.830698] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1741.835784] mount_fs+0xa3/0x310 [ 1741.839153] vfs_kern_mount.part.0+0x68/0x470 [ 1741.843636] do_mount+0x113c/0x2f10 [ 1741.847270] ? cmp_ex_sort+0xc0/0xc0 [ 1741.850968] ? __do_page_fault+0x180/0xd60 [ 1741.855212] ? copy_mount_string+0x40/0x40 [ 1741.859448] ? memset+0x20/0x40 [ 1741.862718] ? copy_mount_options+0x26f/0x380 [ 1741.867213] ksys_mount+0xcf/0x130 [ 1741.870758] __x64_sys_mount+0xba/0x150 [ 1741.874750] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1741.879345] do_syscall_64+0xf9/0x620 [ 1741.883148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1741.888336] RIP: 0033:0x467afa [ 1741.891519] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1741.910592] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1741.918294] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1741.925750] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1741.933003] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1741.940457] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1741.947723] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1741.975960] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1741.986950] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1742.008632] EXT4-fs (loop5): mount failed 08:56:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:31 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:31 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:31 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) getpgid(0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1742.987449] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1743.002929] FAULT_INJECTION: forcing a failure. [ 1743.002929] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.019490] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1743.027892] CPU: 1 PID: 27984 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1743.037204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1743.046559] Call Trace: [ 1743.049140] dump_stack+0x1fc/0x2ef [ 1743.052885] should_fail.cold+0xa/0xf [ 1743.056684] ? setup_fault_attr+0x200/0x200 [ 1743.060997] ? lock_acquire+0x170/0x3c0 [ 1743.064962] __should_failslab+0x115/0x180 [ 1743.069234] should_failslab+0x5/0x10 [ 1743.073116] __kmalloc+0x2ab/0x3c0 [ 1743.076705] ? crypto_create_tfm+0x79/0x2e0 [ 1743.081020] ? up_read+0x17/0x110 [ 1743.084481] crypto_create_tfm+0x79/0x2e0 [ 1743.088637] crypto_alloc_tfm+0xff/0x230 [ 1743.092701] ext4_fill_super+0xb00/0xc7f0 [ 1743.096886] ? vsnprintf+0x2cc/0x14f0 [ 1743.100680] ? pointer+0x850/0x850 [ 1743.104259] ? lock_downgrade+0x720/0x720 [ 1743.108410] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1743.113512] ? snprintf+0xbb/0xf0 [ 1743.117232] ? vsprintf+0x30/0x30 [ 1743.120683] ? wait_for_completion_io+0x10/0x10 [ 1743.125336] ? set_blocksize+0x163/0x3f0 [ 1743.129388] mount_bdev+0x2fc/0x3b0 [ 1743.133019] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1743.138119] mount_fs+0xa3/0x310 [ 1743.141501] vfs_kern_mount.part.0+0x68/0x470 [ 1743.146050] do_mount+0x113c/0x2f10 [ 1743.149676] ? cmp_ex_sort+0xc0/0xc0 [ 1743.153504] ? __do_page_fault+0x180/0xd60 [ 1743.157741] ? copy_mount_string+0x40/0x40 [ 1743.161967] ? memset+0x20/0x40 [ 1743.165235] ? copy_mount_options+0x26f/0x380 [ 1743.169825] ksys_mount+0xcf/0x130 [ 1743.173371] __x64_sys_mount+0xba/0x150 [ 1743.177350] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1743.181921] do_syscall_64+0xf9/0x620 [ 1743.185708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.190886] RIP: 0033:0x467afa [ 1743.194346] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.213327] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1743.221135] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1743.228407] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1743.235840] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1743.243105] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1743.250722] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1743.263011] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1743.270671] EXT4-fs (loop5): Cannot load crc32c driver. 08:56:32 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1743.300137] EXT4-fs (loop3): mount failed [ 1743.300898] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1743.399797] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1743.416162] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1743.430573] EXT4-fs (loop3): mount failed [ 1743.482856] FAULT_INJECTION: forcing a failure. [ 1743.482856] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.499716] CPU: 1 PID: 28008 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1743.507653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1743.517283] Call Trace: [ 1743.519893] dump_stack+0x1fc/0x2ef [ 1743.523545] should_fail.cold+0xa/0xf [ 1743.527361] ? ksys_mount+0xcf/0x130 [ 1743.531092] ? setup_fault_attr+0x200/0x200 [ 1743.535638] ? blk_queue_enter+0x40b/0xb70 [ 1743.539978] __should_failslab+0x115/0x180 [ 1743.544229] should_failslab+0x5/0x10 [ 1743.548043] kmem_cache_alloc_node+0x54/0x3b0 [ 1743.552567] create_task_io_context+0x2c/0x430 [ 1743.557159] generic_make_request_checks+0x1c4f/0x22e0 [ 1743.562483] ? should_fail_bio.isra.0+0xa0/0xa0 [ 1743.567151] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1743.572152] ? kmem_cache_alloc+0x315/0x370 [ 1743.576470] generic_make_request+0x23f/0xdf0 [ 1743.580954] ? blk_put_request+0x110/0x110 [ 1743.585188] ? lock_downgrade+0x720/0x720 [ 1743.589423] submit_bio+0xb1/0x430 [ 1743.593051] ? generic_make_request+0xdf0/0xdf0 [ 1743.597715] ? check_preemption_disabled+0x41/0x280 [ 1743.602810] ? guard_bio_eod+0x2a0/0x650 [ 1743.606864] submit_bh_wbc+0x5a7/0x760 [ 1743.610759] __bread_gfp+0x14e/0x300 [ 1743.614477] ext4_fill_super+0x57b/0xc7f0 [ 1743.618636] ? vsnprintf+0x2cc/0x14f0 [ 1743.622428] ? pointer+0x850/0x850 [ 1743.625958] ? lock_downgrade+0x720/0x720 [ 1743.630090] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1743.635277] ? snprintf+0xbb/0xf0 [ 1743.638738] ? vsprintf+0x30/0x30 [ 1743.642288] ? wait_for_completion_io+0x10/0x10 [ 1743.646969] ? set_blocksize+0x163/0x3f0 [ 1743.651055] mount_bdev+0x2fc/0x3b0 [ 1743.654832] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1743.660020] mount_fs+0xa3/0x310 [ 1743.663523] vfs_kern_mount.part.0+0x68/0x470 [ 1743.668052] do_mount+0x113c/0x2f10 [ 1743.671689] ? cmp_ex_sort+0xc0/0xc0 [ 1743.675392] ? __do_page_fault+0x180/0xd60 [ 1743.679766] ? copy_mount_string+0x40/0x40 [ 1743.683992] ? memset+0x20/0x40 [ 1743.687313] ? copy_mount_options+0x26f/0x380 [ 1743.691833] ksys_mount+0xcf/0x130 [ 1743.695390] __x64_sys_mount+0xba/0x150 [ 1743.699360] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1743.703929] do_syscall_64+0xf9/0x620 [ 1743.708327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.713505] RIP: 0033:0x467afa [ 1743.716798] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.735699] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1743.743403] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1743.750670] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1743.757952] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1743.765207] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1743.772918] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1743.809274] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1743.826657] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1743.868273] EXT4-fs (loop5): mount failed 08:56:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x2, 0x0) 08:56:33 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200009, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:33 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:33 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1744.643501] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1744.656796] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1744.667816] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1744.682619] EXT4-fs (loop3): mount failed [ 1744.702673] FAULT_INJECTION: forcing a failure. [ 1744.702673] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.715250] CPU: 0 PID: 28034 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1744.723179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1744.732543] Call Trace: [ 1744.735162] dump_stack+0x1fc/0x2ef [ 1744.738809] should_fail.cold+0xa/0xf [ 1744.742649] ? setup_fault_attr+0x200/0x200 [ 1744.746979] __should_failslab+0x115/0x180 [ 1744.751221] should_failslab+0x5/0x10 [ 1744.755007] kmem_cache_alloc+0x3f/0x370 [ 1744.759063] ? mempool_alloc+0x350/0x350 [ 1744.763116] mempool_alloc+0x146/0x350 [ 1744.767001] ? mempool_resize+0x790/0x790 [ 1744.771135] ? lock_downgrade+0x720/0x720 [ 1744.775269] ? mark_held_locks+0xa6/0xf0 [ 1744.779330] bio_alloc_bioset+0x389/0x5e0 [ 1744.783493] ? __find_get_block+0x314/0xde0 [ 1744.787807] ? bvec_alloc+0x2f0/0x2f0 [ 1744.791594] ? __getblk_slow+0x6a3/0x9e0 [ 1744.795651] submit_bh_wbc+0x141/0x760 [ 1744.799701] __bread_gfp+0x14e/0x300 [ 1744.803400] ext4_fill_super+0x57b/0xc7f0 [ 1744.807539] ? vsnprintf+0x2cc/0x14f0 [ 1744.811364] ? pointer+0x850/0x850 [ 1744.815115] ? lock_downgrade+0x720/0x720 [ 1744.819261] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1744.824443] ? snprintf+0xbb/0xf0 [ 1744.827894] ? vsprintf+0x30/0x30 [ 1744.831336] ? wait_for_completion_io+0x10/0x10 [ 1744.835988] ? set_blocksize+0x163/0x3f0 [ 1744.840123] mount_bdev+0x2fc/0x3b0 [ 1744.843757] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1744.849017] mount_fs+0xa3/0x310 [ 1744.852386] vfs_kern_mount.part.0+0x68/0x470 [ 1744.856866] do_mount+0x113c/0x2f10 [ 1744.860490] ? cmp_ex_sort+0xc0/0xc0 [ 1744.864188] ? __do_page_fault+0x180/0xd60 [ 1744.868405] ? copy_mount_string+0x40/0x40 [ 1744.872900] ? memset+0x20/0x40 [ 1744.876165] ? copy_mount_options+0x26f/0x380 [ 1744.880647] ksys_mount+0xcf/0x130 [ 1744.884180] __x64_sys_mount+0xba/0x150 [ 1744.888226] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1744.892807] do_syscall_64+0xf9/0x620 [ 1744.896605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1744.901780] RIP: 0033:0x467afa [ 1744.904970] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.923935] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1744.931639] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1744.938893] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1744.946157] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1744.953411] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1744.960663] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1744.981982] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1745.012998] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1745.025041] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:56:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1745.057521] EXT4-fs (loop5): mount failed [ 1745.184450] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1745.204001] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1745.224714] EXT4-fs (loop3): mount failed [ 1745.293327] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1745.310354] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1745.325296] EXT4-fs (loop3): mount failed 08:56:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:34 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x500, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:34 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:34 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r2, r3/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x2080}, {r0, 0x200}, {r0, 0x4001}, {r0, 0x4001}, {r1, 0x2428}, {r4, 0x6441}, {r0, 0x2045}], 0x7, 0xfffffff8) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1746.004351] FAULT_INJECTION: forcing a failure. [ 1746.004351] name failslab, interval 1, probability 0, space 0, times 0 [ 1746.026930] CPU: 0 PID: 28089 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1746.034636] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1746.035123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1746.035129] Call Trace: [ 1746.035154] dump_stack+0x1fc/0x2ef [ 1746.035180] should_fail.cold+0xa/0xf [ 1746.062272] ? setup_fault_attr+0x200/0x200 [ 1746.066583] __should_failslab+0x115/0x180 [ 1746.070819] should_failslab+0x5/0x10 [ 1746.074615] kmem_cache_alloc+0x3f/0x370 [ 1746.078656] ? mempool_alloc+0x350/0x350 [ 1746.082697] mempool_alloc+0x146/0x350 [ 1746.086574] ? mempool_resize+0x790/0x790 [ 1746.090851] ? lock_downgrade+0x720/0x720 [ 1746.095004] ? mark_held_locks+0xa6/0xf0 [ 1746.099167] bio_alloc_bioset+0x389/0x5e0 [ 1746.103305] ? __find_get_block+0x314/0xde0 [ 1746.107613] ? bvec_alloc+0x2f0/0x2f0 [ 1746.111421] ? __getblk_slow+0x6a3/0x9e0 [ 1746.115469] submit_bh_wbc+0x141/0x760 [ 1746.119441] __bread_gfp+0x14e/0x300 [ 1746.123143] ext4_fill_super+0x1f01/0xc7f0 [ 1746.127386] ? pointer+0x850/0x850 [ 1746.130913] ? lock_downgrade+0x720/0x720 [ 1746.135132] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1746.140221] ? snprintf+0xbb/0xf0 [ 1746.143658] ? vsprintf+0x30/0x30 [ 1746.147103] ? wait_for_completion_io+0x10/0x10 [ 1746.151761] ? set_blocksize+0x163/0x3f0 [ 1746.155810] mount_bdev+0x2fc/0x3b0 [ 1746.159431] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1746.164526] mount_fs+0xa3/0x310 [ 1746.167889] vfs_kern_mount.part.0+0x68/0x470 [ 1746.172388] do_mount+0x113c/0x2f10 [ 1746.176001] ? cmp_ex_sort+0xc0/0xc0 [ 1746.179699] ? __do_page_fault+0x180/0xd60 [ 1746.183940] ? copy_mount_string+0x40/0x40 [ 1746.188162] ? memset+0x20/0x40 [ 1746.191425] ? copy_mount_options+0x26f/0x380 [ 1746.195907] ksys_mount+0xcf/0x130 [ 1746.199443] __x64_sys_mount+0xba/0x150 [ 1746.203487] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1746.208132] do_syscall_64+0xf9/0x620 [ 1746.211926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1746.217110] RIP: 0033:0x467afa [ 1746.220312] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1746.239194] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1746.246887] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1746.254138] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1746.261407] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1746.268664] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1746.276640] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1746.338363] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1746.342629] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1746.351778] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 08:56:35 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x600, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1746.375400] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1746.379270] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1746.408871] EXT4-fs (loop3): mount failed [ 1746.416498] EXT4-fs (loop5): mount failed [ 1746.568824] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1746.588498] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1746.598042] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1746.623554] EXT4-fs (loop3): mount failed 08:56:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1000000, 0x0) 08:56:36 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:36 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x700, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:36 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x100, 0x1, 0x4, 0x2, 0x8001, {r0, r1/1000+10000}, {0x2, 0x2, 0x4, 0x0, 0x1, 0x4, "c3f05d29"}, 0x2, 0x3, @offset=0xfffffffd, 0x2}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000004780)={0x2020}, 0x2020) [ 1747.669892] FAULT_INJECTION: forcing a failure. [ 1747.669892] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.694811] CPU: 0 PID: 28133 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1747.702730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.712207] Call Trace: [ 1747.714830] dump_stack+0x1fc/0x2ef [ 1747.716081] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1747.718473] should_fail.cold+0xa/0xf [ 1747.718494] ? setup_fault_attr+0x200/0x200 [ 1747.733783] __should_failslab+0x115/0x180 [ 1747.738145] should_failslab+0x5/0x10 [ 1747.741957] kmem_cache_alloc+0x3f/0x370 [ 1747.746031] ? mempool_alloc+0x350/0x350 [ 1747.750103] mempool_alloc+0x146/0x350 [ 1747.754116] ? mempool_resize+0x790/0x790 [ 1747.758399] ? lock_downgrade+0x720/0x720 [ 1747.762753] ? mark_held_locks+0xa6/0xf0 [ 1747.766828] bio_alloc_bioset+0x389/0x5e0 [ 1747.771073] ? __find_get_block+0x314/0xde0 [ 1747.775392] ? bvec_alloc+0x2f0/0x2f0 [ 1747.779190] ? __getblk_slow+0x6a3/0x9e0 [ 1747.783425] submit_bh_wbc+0x141/0x760 [ 1747.787300] __bread_gfp+0x14e/0x300 [ 1747.791002] ext4_fill_super+0x1f01/0xc7f0 [ 1747.795237] ? pointer+0x850/0x850 [ 1747.798766] ? lock_downgrade+0x720/0x720 [ 1747.802897] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1747.807987] ? snprintf+0xbb/0xf0 [ 1747.811427] ? vsprintf+0x30/0x30 [ 1747.814956] ? wait_for_completion_io+0x10/0x10 [ 1747.819625] ? set_blocksize+0x163/0x3f0 [ 1747.823704] mount_bdev+0x2fc/0x3b0 [ 1747.827326] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1747.832420] mount_fs+0xa3/0x310 [ 1747.835778] vfs_kern_mount.part.0+0x68/0x470 [ 1747.840262] do_mount+0x113c/0x2f10 [ 1747.843876] ? cmp_ex_sort+0xc0/0xc0 [ 1747.847591] ? __do_page_fault+0x180/0xd60 [ 1747.851820] ? copy_mount_string+0x40/0x40 [ 1747.856060] ? memset+0x20/0x40 [ 1747.859328] ? copy_mount_options+0x26f/0x380 [ 1747.863810] ksys_mount+0xcf/0x130 [ 1747.867339] __x64_sys_mount+0xba/0x150 [ 1747.871301] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1747.876082] do_syscall_64+0xf9/0x620 [ 1747.879880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.885144] RIP: 0033:0x467afa [ 1747.888329] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1747.907736] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 08:56:36 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x0, &(0x7f0000000140)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1747.915430] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1747.922684] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1747.929938] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1747.937310] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1747.944569] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1747.969681] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1747.997917] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1748.034852] EXT4-fs (loop3): mount failed [ 1748.046249] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1748.056805] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1748.076467] EXT4-fs (loop5): mount failed [ 1748.176048] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1748.189121] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1748.205933] EXT4-fs (loop3): mount failed 08:56:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:37 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:37 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:37 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200010, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1749.045612] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1749.065074] FAULT_INJECTION: forcing a failure. [ 1749.065074] name failslab, interval 1, probability 0, space 0, times 0 08:56:38 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x20000, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1749.093258] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1749.143854] CPU: 0 PID: 28187 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1749.145097] EXT4-fs (loop3): mount failed [ 1749.151779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1749.151785] Call Trace: [ 1749.151809] dump_stack+0x1fc/0x2ef [ 1749.151829] should_fail.cold+0xa/0xf [ 1749.151848] ? setup_fault_attr+0x200/0x200 [ 1749.151869] __should_failslab+0x115/0x180 [ 1749.151884] should_failslab+0x5/0x10 [ 1749.151902] kmem_cache_alloc+0x3f/0x370 [ 1749.192008] ? mempool_alloc+0x350/0x350 [ 1749.196080] mempool_alloc+0x146/0x350 [ 1749.199965] ? mempool_resize+0x790/0x790 [ 1749.204107] ? lock_downgrade+0x720/0x720 [ 1749.208245] ? mark_held_locks+0xa6/0xf0 [ 1749.212343] bio_alloc_bioset+0x389/0x5e0 [ 1749.216857] ? __find_get_block+0x314/0xde0 [ 1749.221611] ? bvec_alloc+0x2f0/0x2f0 [ 1749.225416] ? __getblk_slow+0x6a3/0x9e0 [ 1749.229479] submit_bh_wbc+0x141/0x760 [ 1749.233550] __bread_gfp+0x14e/0x300 [ 1749.237258] ext4_fill_super+0x1f01/0xc7f0 [ 1749.241506] ? pointer+0x850/0x850 [ 1749.245230] ? lock_downgrade+0x720/0x720 [ 1749.249364] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1749.254557] ? snprintf+0xbb/0xf0 [ 1749.258004] ? vsprintf+0x30/0x30 [ 1749.261460] ? wait_for_completion_io+0x10/0x10 [ 1749.266122] ? set_blocksize+0x163/0x3f0 [ 1749.270181] mount_bdev+0x2fc/0x3b0 [ 1749.273867] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1749.278970] mount_fs+0xa3/0x310 [ 1749.282529] vfs_kern_mount.part.0+0x68/0x470 [ 1749.287218] do_mount+0x113c/0x2f10 [ 1749.290840] ? cmp_ex_sort+0xc0/0xc0 [ 1749.294561] ? __do_page_fault+0x180/0xd60 [ 1749.298878] ? copy_mount_string+0x40/0x40 [ 1749.303218] ? memset+0x20/0x40 [ 1749.306500] ? copy_mount_options+0x26f/0x380 [ 1749.310984] ksys_mount+0xcf/0x130 [ 1749.314528] __x64_sys_mount+0xba/0x150 [ 1749.318670] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1749.323466] do_syscall_64+0xf9/0x620 [ 1749.327272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.332664] RIP: 0033:0x467afa [ 1749.335973] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.355298] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1749.362995] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1749.370351] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1749.377622] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1749.384970] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1749.392232] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1749.414055] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1749.425530] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1749.440459] EXT4-fs (loop5): mount failed [ 1749.450420] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1749.528040] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1749.553861] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1749.582871] EXT4-fs (loop3): mount failed 08:56:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x2000000, 0x0) 08:56:39 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:39 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200023, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:39 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1750.722766] FAULT_INJECTION: forcing a failure. [ 1750.722766] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.734504] CPU: 1 PID: 28216 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1750.742402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1750.751801] Call Trace: [ 1750.754406] dump_stack+0x1fc/0x2ef [ 1750.758044] should_fail.cold+0xa/0xf [ 1750.761853] ? kernel_poison_pages+0x2c/0x2a0 [ 1750.766384] ? setup_fault_attr+0x200/0x200 [ 1750.770724] ? get_page_from_freelist+0x1e7f/0x4170 [ 1750.775763] __should_failslab+0x115/0x180 [ 1750.781761] should_failslab+0x5/0x10 [ 1750.785583] kmem_cache_alloc+0x3f/0x370 [ 1750.789665] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1750.795311] radix_tree_extend+0x191/0x4b0 [ 1750.799564] ? mem_cgroup_oom_trylock+0x220/0x220 [ 1750.804431] __radix_tree_create+0x448/0x540 [ 1750.808864] page_cache_tree_insert+0xac/0x3f0 [ 1750.813503] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1750.818974] ? lock_acquire+0x170/0x3c0 [ 1750.822964] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1750.828283] __add_to_page_cache_locked+0x46e/0xb60 [ 1750.833317] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1750.838449] add_to_page_cache_lru+0x16a/0x680 [ 1750.843037] ? add_to_page_cache_locked+0x40/0x40 [ 1750.847896] pagecache_get_page+0x478/0xd50 [ 1750.852215] __getblk_slow+0x216/0x9e0 [ 1750.856261] __breadahead_gfp+0x11b/0x130 [ 1750.860435] ? __breadahead+0x130/0x130 [ 1750.864513] ? descriptor_loc+0x11d/0x390 [ 1750.868659] ext4_fill_super+0x436b/0xc7f0 [ 1750.872897] ? pointer+0x850/0x850 [ 1750.876464] ? lock_downgrade+0x720/0x720 [ 1750.880599] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1750.885689] ? snprintf+0xbb/0xf0 [ 1750.889139] ? vsprintf+0x30/0x30 [ 1750.892583] ? wait_for_completion_io+0x10/0x10 [ 1750.897237] ? set_blocksize+0x163/0x3f0 [ 1750.901286] mount_bdev+0x2fc/0x3b0 [ 1750.904912] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1750.909997] mount_fs+0xa3/0x310 [ 1750.913355] vfs_kern_mount.part.0+0x68/0x470 [ 1750.917843] do_mount+0x113c/0x2f10 [ 1750.921457] ? cmp_ex_sort+0xc0/0xc0 [ 1750.925276] ? __do_page_fault+0x180/0xd60 [ 1750.929503] ? copy_mount_string+0x40/0x40 [ 1750.934280] ? memset+0x20/0x40 [ 1750.937632] ? copy_mount_options+0x26f/0x380 [ 1750.942115] ksys_mount+0xcf/0x130 [ 1750.945664] __x64_sys_mount+0xba/0x150 [ 1750.949636] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1750.954249] do_syscall_64+0xf9/0x620 [ 1750.958091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1750.963280] RIP: 0033:0x467afa [ 1750.966471] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.985468] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1750.993163] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1751.000620] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1751.007878] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1751.015236] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:56:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1751.022503] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1751.050389] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1751.069263] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1751.109713] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1751.128542] EXT4-fs (loop5): mount failed [ 1751.137286] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1751.148739] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1751.164346] EXT4-fs (loop3): mount failed [ 1751.290274] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1751.302191] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1751.317635] EXT4-fs (loop3): mount failed 08:56:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:40 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20002d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:40 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:41 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1752.068022] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1752.093133] FAULT_INJECTION: forcing a failure. [ 1752.093133] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.114893] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1752.130656] CPU: 1 PID: 28266 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1752.138667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1752.148033] Call Trace: [ 1752.150638] dump_stack+0x1fc/0x2ef [ 1752.154329] should_fail.cold+0xa/0xf [ 1752.158155] ? setup_fault_attr+0x200/0x200 [ 1752.162493] ? lock_acquire+0x170/0x3c0 [ 1752.166504] __should_failslab+0x115/0x180 [ 1752.170751] should_failslab+0x5/0x10 [ 1752.175170] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1752.180291] __kmalloc_node+0x38/0x70 [ 1752.184119] kvmalloc_node+0x61/0xf0 [ 1752.187843] ext4_fill_super+0x425d/0xc7f0 [ 1752.192100] ? pointer+0x850/0x850 [ 1752.195657] ? lock_downgrade+0x720/0x720 [ 1752.199820] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1752.204942] ? snprintf+0xbb/0xf0 [ 1752.208402] ? vsprintf+0x30/0x30 [ 1752.211870] ? wait_for_completion_io+0x10/0x10 [ 1752.213591] EXT4-fs (loop3): mount failed [ 1752.216537] ? set_blocksize+0x163/0x3f0 [ 1752.216558] mount_bdev+0x2fc/0x3b0 [ 1752.216574] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1752.216589] mount_fs+0xa3/0x310 [ 1752.216606] vfs_kern_mount.part.0+0x68/0x470 [ 1752.241346] do_mount+0x113c/0x2f10 [ 1752.244987] ? cmp_ex_sort+0xc0/0xc0 [ 1752.248726] ? __do_page_fault+0x180/0xd60 [ 1752.252988] ? copy_mount_string+0x40/0x40 [ 1752.257242] ? memset+0x20/0x40 [ 1752.260580] ? copy_mount_options+0x26f/0x380 [ 1752.265115] ksys_mount+0xcf/0x130 [ 1752.268753] __x64_sys_mount+0xba/0x150 [ 1752.272740] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1752.277326] do_syscall_64+0xf9/0x620 [ 1752.281154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1752.286348] RIP: 0033:0x467afa [ 1752.289543] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1752.308622] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1752.316345] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1752.323627] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1752.331109] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1752.338470] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1752.346025] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1752.354557] EXT4-fs (loop5): not enough memory [ 1752.380051] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1752.468949] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1752.500042] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1752.543624] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1752.552407] EXT4-fs (loop3): mount failed 08:56:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfeffffff, 0x0) 08:56:42 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:42 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:42 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200032, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:42 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) [ 1753.797643] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1753.808166] FAULT_INJECTION: forcing a failure. [ 1753.808166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1753.844972] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1753.861051] CPU: 1 PID: 28313 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1753.868962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1753.870245] EXT4-fs (loop3): mount failed [ 1753.878414] Call Trace: [ 1753.878437] dump_stack+0x1fc/0x2ef [ 1753.878461] should_fail.cold+0xa/0xf [ 1753.878479] ? setup_fault_attr+0x200/0x200 [ 1753.878504] __alloc_pages_nodemask+0x239/0x2890 [ 1753.878524] ? kasan_kmalloc+0x139/0x160 [ 1753.878544] ? mark_held_locks+0xf0/0xf0 [ 1753.878558] ? do_syscall_64+0xf9/0x620 [ 1753.878572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1753.878588] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1753.878603] ? mark_held_locks+0xf0/0xf0 [ 1753.878618] ? __debug_object_init+0x410/0x9b0 [ 1753.878635] ? mark_held_locks+0xa6/0xf0 [ 1753.878650] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1753.878671] alloc_pages_current+0x193/0x2a0 [ 1753.878681] ? __debug_object_init+0x410/0x9b0 [ 1753.878696] get_zeroed_page+0x10/0x40 [ 1753.878709] ext4_calculate_overhead+0xfb/0x11c0 [ 1753.878736] ext4_fill_super+0x99eb/0xc7f0 [ 1753.878773] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1753.878791] ? snprintf+0xbb/0xf0 [ 1753.878803] ? vsprintf+0x30/0x30 [ 1753.878820] ? wait_for_completion_io+0x10/0x10 [ 1753.878833] ? set_blocksize+0x163/0x3f0 [ 1753.878855] mount_bdev+0x2fc/0x3b0 [ 1753.989150] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1753.994359] mount_fs+0xa3/0x310 [ 1753.997736] vfs_kern_mount.part.0+0x68/0x470 [ 1754.002427] do_mount+0x113c/0x2f10 [ 1754.006066] ? cmp_ex_sort+0xc0/0xc0 [ 1754.009786] ? __do_page_fault+0x180/0xd60 [ 1754.014033] ? copy_mount_string+0x40/0x40 [ 1754.018304] ? memset+0x20/0x40 [ 1754.021595] ? copy_mount_options+0x26f/0x380 [ 1754.026107] ksys_mount+0xcf/0x130 [ 1754.029639] __x64_sys_mount+0xba/0x150 [ 1754.033604] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1754.038173] do_syscall_64+0xf9/0x620 [ 1754.042012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1754.047205] RIP: 0033:0x467afa [ 1754.050382] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1754.069291] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1754.077043] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1754.084311] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1754.091583] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1754.099024] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1754.106309] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1754.170947] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1754.230013] EXT4-fs: failed to create workqueue [ 1754.235581] EXT4-fs (loop3): mount failed 08:56:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:44 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:44 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200048, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:44 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:44 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004780)={0x2020}, 0x2020) [ 1755.105028] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1755.134458] FAULT_INJECTION: forcing a failure. [ 1755.134458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1755.160631] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1755.170435] CPU: 1 PID: 28349 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1755.182012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.191380] Call Trace: [ 1755.193983] dump_stack+0x1fc/0x2ef [ 1755.194794] EXT4-fs (loop3): mount failed [ 1755.198489] should_fail.cold+0xa/0xf [ 1755.198509] ? setup_fault_attr+0x200/0x200 [ 1755.198533] __alloc_pages_nodemask+0x239/0x2890 [ 1755.198552] ? kasan_kmalloc+0x139/0x160 [ 1755.219589] ? mark_held_locks+0xf0/0xf0 [ 1755.223664] ? do_syscall_64+0xf9/0x620 [ 1755.227696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.233081] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1755.237927] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1755.242495] ? finish_task_switch+0x146/0x760 [ 1755.247082] ? finish_task_switch+0x118/0x760 [ 1755.251676] ? mark_held_locks+0xf0/0xf0 [ 1755.255756] ? __debug_object_init+0x410/0x9b0 [ 1755.260374] ? mark_held_locks+0xa6/0xf0 [ 1755.264446] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1755.269557] alloc_pages_current+0x193/0x2a0 [ 1755.273969] ? __debug_object_init+0x410/0x9b0 [ 1755.278593] get_zeroed_page+0x10/0x40 [ 1755.282483] ext4_calculate_overhead+0xfb/0x11c0 [ 1755.287256] ext4_fill_super+0x99eb/0xc7f0 [ 1755.291605] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1755.296846] ? snprintf+0xbb/0xf0 [ 1755.300331] ? vsprintf+0x30/0x30 [ 1755.303827] ? wait_for_completion_io+0x10/0x10 [ 1755.308519] ? set_blocksize+0x163/0x3f0 [ 1755.312713] mount_bdev+0x2fc/0x3b0 [ 1755.316349] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1755.321504] mount_fs+0xa3/0x310 [ 1755.324881] vfs_kern_mount.part.0+0x68/0x470 [ 1755.329398] do_mount+0x113c/0x2f10 [ 1755.333110] ? cmp_ex_sort+0xc0/0xc0 [ 1755.336831] ? __do_page_fault+0x180/0xd60 [ 1755.341077] ? copy_mount_string+0x40/0x40 [ 1755.345521] ? memset+0x20/0x40 [ 1755.348793] ? copy_mount_options+0x26f/0x380 [ 1755.353281] ksys_mount+0xcf/0x130 [ 1755.356823] __x64_sys_mount+0xba/0x150 [ 1755.360794] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1755.365373] do_syscall_64+0xf9/0x620 [ 1755.369163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.374354] RIP: 0033:0x467afa [ 1755.377592] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1755.396482] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1755.404182] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1755.411447] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1755.418714] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1755.426076] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1755.433473] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1755.511032] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1755.533342] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1755.551786] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1755.567566] EXT4-fs (loop3): mount failed 08:56:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffffffe, 0x0) 08:56:45 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:56:45 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20004c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:45 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1756.776082] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1756.802056] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:56:45 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 1756.827957] FAULT_INJECTION: forcing a failure. [ 1756.827957] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1756.839797] CPU: 1 PID: 28389 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1756.847869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1756.857323] Call Trace: [ 1756.860019] dump_stack+0x1fc/0x2ef [ 1756.863768] should_fail.cold+0xa/0xf [ 1756.864081] EXT4-fs (loop3): mount failed [ 1756.867674] ? setup_fault_attr+0x200/0x200 [ 1756.867694] ? is_bpf_text_address+0xfc/0x1b0 [ 1756.867711] ? kernel_text_address+0xbd/0xf0 [ 1756.867729] __alloc_pages_nodemask+0x239/0x2890 [ 1756.889922] ? __lock_acquire+0x6de/0x3ff0 [ 1756.894175] ? mb_cache_create+0x4f/0x4c0 [ 1756.898331] ? ext4_fill_super+0x9d89/0xc7f0 [ 1756.902760] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1756.907707] ? do_mount+0x113c/0x2f10 [ 1756.911508] ? ksys_mount+0xcf/0x130 [ 1756.915228] ? __x64_sys_mount+0xba/0x150 [ 1756.919383] ? do_syscall_64+0xf9/0x620 [ 1756.923368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1756.928755] ? mark_held_locks+0xa6/0xf0 [ 1756.932826] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1756.937944] ? should_fail+0x142/0x7b0 [ 1756.941848] cache_grow_begin+0xa4/0x8a0 [ 1756.945921] ? setup_fault_attr+0x200/0x200 [ 1756.950248] ? lock_acquire+0x170/0x3c0 [ 1756.954233] cache_alloc_refill+0x273/0x340 [ 1756.958566] __kmalloc+0x362/0x3c0 [ 1756.962110] ? mb_cache_create+0x155/0x4c0 [ 1756.966351] mb_cache_create+0x155/0x4c0 [ 1756.970540] ext4_fill_super+0x9d89/0xc7f0 [ 1756.974809] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1756.979924] ? snprintf+0xbb/0xf0 [ 1756.983386] ? vsprintf+0x30/0x30 [ 1756.986894] ? wait_for_completion_io+0x10/0x10 [ 1756.991568] ? set_blocksize+0x163/0x3f0 [ 1756.995635] mount_bdev+0x2fc/0x3b0 [ 1756.999273] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1757.004389] mount_fs+0xa3/0x310 [ 1757.007861] vfs_kern_mount.part.0+0x68/0x470 [ 1757.012382] do_mount+0x113c/0x2f10 [ 1757.016039] ? cmp_ex_sort+0xc0/0xc0 [ 1757.019942] ? __do_page_fault+0x180/0xd60 [ 1757.024275] ? copy_mount_string+0x40/0x40 [ 1757.029170] ? memset+0x20/0x40 [ 1757.032468] ? copy_mount_options+0x26f/0x380 [ 1757.036984] ksys_mount+0xcf/0x130 [ 1757.040544] __x64_sys_mount+0xba/0x150 [ 1757.044621] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1757.049761] do_syscall_64+0xf9/0x620 [ 1757.053576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.058775] RIP: 0033:0x467afa [ 1757.061973] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1757.082971] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1757.090693] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1757.098146] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1757.105497] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1757.112786] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1757.120131] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1757.146914] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1757.165024] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1757.179524] EXT4-fs (loop5): mount failed [ 1757.201700] FAT-fs (loop1): Unrecognized mount option "sho" or missing value 08:56:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:56:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200056, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:47 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:47 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1758.148068] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1758.160453] FAULT_INJECTION: forcing a failure. [ 1758.160453] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.203754] CPU: 0 PID: 28426 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1758.211693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1758.221060] Call Trace: [ 1758.223667] dump_stack+0x1fc/0x2ef [ 1758.227418] should_fail.cold+0xa/0xf [ 1758.231257] ? setup_fault_attr+0x200/0x200 [ 1758.235596] ? lock_acquire+0x170/0x3c0 [ 1758.239591] __should_failslab+0x115/0x180 [ 1758.243843] should_failslab+0x5/0x10 [ 1758.247662] kmem_cache_alloc_trace+0x284/0x380 [ 1758.252551] prealloc_shrinker+0x8d/0x340 [ 1758.256712] register_shrinker+0x13/0x40 [ 1758.260889] mb_cache_create+0x275/0x4c0 [ 1758.264970] ext4_fill_super+0x9d89/0xc7f0 [ 1758.269497] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1758.274612] ? snprintf+0xbb/0xf0 [ 1758.278068] ? vsprintf+0x30/0x30 [ 1758.281528] ? wait_for_completion_io+0x10/0x10 [ 1758.286197] ? set_blocksize+0x163/0x3f0 [ 1758.290266] mount_bdev+0x2fc/0x3b0 [ 1758.293900] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1758.299005] mount_fs+0xa3/0x310 [ 1758.302381] vfs_kern_mount.part.0+0x68/0x470 [ 1758.306887] do_mount+0x113c/0x2f10 [ 1758.310518] ? cmp_ex_sort+0xc0/0xc0 [ 1758.314236] ? __do_page_fault+0x180/0xd60 [ 1758.318565] ? copy_mount_string+0x40/0x40 [ 1758.322812] ? memset+0x20/0x40 [ 1758.326100] ? copy_mount_options+0x26f/0x380 [ 1758.330603] ksys_mount+0xcf/0x130 [ 1758.334149] __x64_sys_mount+0xba/0x150 [ 1758.338228] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1758.342904] do_syscall_64+0xf9/0x620 [ 1758.346710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1758.351912] RIP: 0033:0x467afa [ 1758.355198] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1758.359478] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1758.374191] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1758.374204] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1758.374210] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1758.374217] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1758.374223] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1758.374231] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1758.422770] EXT4-fs (loop5): Failed to create ea_block_cache [ 1758.427225] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1758.448773] EXT4-fs (loop3): mount failed [ 1758.591571] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1758.620323] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1758.648048] EXT4-fs (loop3): mount failed 08:56:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x100000000000000, 0x0) 08:56:48 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:56:48 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:48 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200060, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1759.846404] FAULT_INJECTION: forcing a failure. [ 1759.846404] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.875073] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1759.899343] CPU: 0 PID: 28464 Comm: syz-executor.0 Not tainted 4.19.197-syzkaller #0 [ 1759.907263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1759.916715] Call Trace: [ 1759.919349] dump_stack+0x1fc/0x2ef [ 1759.923002] should_fail.cold+0xa/0xf [ 1759.926839] ? setup_fault_attr+0x200/0x200 [ 1759.931173] ? lock_acquire+0x170/0x3c0 [ 1759.935166] __should_failslab+0x115/0x180 [ 1759.939423] should_failslab+0x5/0x10 [ 1759.943325] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1759.948444] __kmalloc_node+0x38/0x70 [ 1759.952265] kvmalloc_node+0x61/0xf0 [ 1759.955993] seq_read+0x807/0x1160 [ 1759.959902] ? traverse.part.0+0x590/0x590 [ 1759.964149] proc_reg_read+0x1bd/0x2d0 [ 1759.968056] ? proc_reg_unlocked_ioctl+0x2c0/0x2c0 [ 1759.972998] ? __fdget_pos+0x26f/0x310 [ 1759.976901] __vfs_read+0xf7/0x750 [ 1759.980541] ? proc_reg_unlocked_ioctl+0x2c0/0x2c0 [ 1759.989568] ? __se_sys_copy_file_range+0x410/0x410 [ 1759.994617] ? fsnotify_first_mark+0x200/0x200 [ 1759.999215] ? mutex_trylock+0x1a0/0x1a0 [ 1760.003289] ? security_file_permission+0x1c0/0x220 [ 1760.008405] vfs_read+0x194/0x3c0 [ 1760.011958] ksys_read+0x12b/0x2a0 [ 1760.015512] ? kernel_write+0x110/0x110 [ 1760.019492] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1760.024525] ? do_syscall_64+0x21/0x620 [ 1760.028509] do_syscall_64+0xf9/0x620 [ 1760.032322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.037510] RIP: 0033:0x4665d9 [ 1760.040828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.059735] RSP: 002b:00007fb63fe2e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1760.067724] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1760.074996] RDX: 0000000000002020 RSI: 0000000020004780 RDI: 0000000000000003 [ 1760.082265] RBP: 00007fb63fe2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1760.089546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1760.096106] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1760.096827] R13: 00007ffdf473f45f R14: 00007fb63fe2e300 R15: 0000000000022000 [ 1760.112336] FAULT_INJECTION: forcing a failure. [ 1760.112336] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.118256] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1760.157967] EXT4-fs (loop3): mount failed [ 1760.164235] CPU: 0 PID: 28471 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1760.172164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.181524] Call Trace: [ 1760.184125] dump_stack+0x1fc/0x2ef [ 1760.187803] should_fail.cold+0xa/0xf [ 1760.191766] ? setup_fault_attr+0x200/0x200 [ 1760.196219] ? lock_acquire+0x170/0x3c0 [ 1760.200189] __should_failslab+0x115/0x180 [ 1760.204420] should_failslab+0x5/0x10 [ 1760.208217] kmem_cache_alloc_trace+0x284/0x380 [ 1760.212893] __alloc_workqueue_key+0x7de/0xed0 [ 1760.217464] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1760.222035] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1760.227045] ext4_fill_super+0x6edb/0xc7f0 [ 1760.231304] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1760.236401] ? snprintf+0xbb/0xf0 [ 1760.239846] ? vsprintf+0x30/0x30 [ 1760.243295] ? wait_for_completion_io+0x10/0x10 [ 1760.247973] ? set_blocksize+0x163/0x3f0 [ 1760.252023] mount_bdev+0x2fc/0x3b0 [ 1760.255642] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1760.260731] mount_fs+0xa3/0x310 [ 1760.264090] vfs_kern_mount.part.0+0x68/0x470 [ 1760.268579] do_mount+0x113c/0x2f10 [ 1760.272190] ? cmp_ex_sort+0xc0/0xc0 [ 1760.275916] ? __do_page_fault+0x180/0xd60 [ 1760.280184] ? copy_mount_string+0x40/0x40 [ 1760.284407] ? memset+0x20/0x40 [ 1760.287671] ? copy_mount_options+0x26f/0x380 [ 1760.292238] ksys_mount+0xcf/0x130 [ 1760.295777] __x64_sys_mount+0xba/0x150 [ 1760.299745] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1760.304328] do_syscall_64+0xf9/0x620 [ 1760.308119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.313298] RIP: 0033:0x467afa [ 1760.316489] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.335435] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1760.343149] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1760.350837] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 08:56:49 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1760.358090] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1760.365360] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1760.372709] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1760.381533] EXT4-fs: failed to create workqueue [ 1760.386375] EXT4-fs (loop5): mount failed [ 1760.507081] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1760.525159] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1760.548256] FAULT_INJECTION: forcing a failure. 08:56:49 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1760.548256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1760.580598] CPU: 0 PID: 28500 Comm: syz-executor.0 Not tainted 4.19.197-syzkaller #0 [ 1760.588699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.598146] Call Trace: [ 1760.600750] dump_stack+0x1fc/0x2ef [ 1760.604398] should_fail.cold+0xa/0xf [ 1760.608219] ? lock_acquire+0x170/0x3c0 [ 1760.612208] ? setup_fault_attr+0x200/0x200 [ 1760.616552] __alloc_pages_nodemask+0x239/0x2890 [ 1760.621330] ? __lock_acquire+0x6de/0x3ff0 [ 1760.625587] ? __lock_acquire+0x6de/0x3ff0 08:56:49 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1760.629846] ? hash_key_type_and_desc+0x1fa/0x2b0 [ 1760.634713] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1760.639577] ? get_reg+0x1f0/0x1f0 [ 1760.643137] ? keyring_get_key_chunk+0x15a/0x270 [ 1760.647913] ? assoc_array_walk+0x1f1/0x620 [ 1760.652243] ? widen_string+0xd8/0x2a0 [ 1760.656142] ? put_dec_trunc8+0x263/0x2f0 [ 1760.660476] alloc_pages_vma+0xf2/0x780 [ 1760.664467] do_anonymous_page+0x7c2/0x1be0 [ 1760.668804] ? __pte_alloc+0x340/0x340 [ 1760.672700] ? memcpy+0x35/0x50 [ 1760.675989] ? mark_held_locks+0xf0/0xf0 [ 1760.680065] __handle_mm_fault+0x227a/0x41c0 [ 1760.684487] ? vm_insert_page+0x9c0/0x9c0 [ 1760.688658] ? check_preemption_disabled+0x41/0x280 [ 1760.693688] handle_mm_fault+0x436/0xb10 [ 1760.697769] __do_page_fault+0x68e/0xd60 [ 1760.701850] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1760.706874] ? spurious_fault+0x840/0x840 [ 1760.711115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1760.715965] page_fault+0x1e/0x30 [ 1760.719422] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1760.725328] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1760.744663] RSP: 0018:ffff8882313d7b38 EFLAGS: 00010202 [ 1760.750048] RAX: ffffed1008bb2996 RBX: 000000000000092c RCX: 00000000000000ac [ 1760.757317] RDX: 000000000000092c RSI: ffff888045d94c00 RDI: 0000000020005000 [ 1760.764587] RBP: ffff888045d94380 R08: 0000000000000000 R09: ffffed1008bb2995 [ 1760.771857] R10: ffff888045d94cab R11: 0000000000000000 R12: 0000000020004780 [ 1760.779648] R13: 00000000200050ac R14: 00007ffffffff000 R15: 0000000000000000 [ 1760.786949] _copy_to_user+0xe2/0x100 [ 1760.790757] seq_read+0xd1b/0x1160 [ 1760.794313] ? traverse.part.0+0x590/0x590 [ 1760.798550] proc_reg_read+0x1bd/0x2d0 [ 1760.802448] ? proc_reg_unlocked_ioctl+0x2c0/0x2c0 [ 1760.807377] ? __fdget_pos+0x26f/0x310 [ 1760.811286] __vfs_read+0xf7/0x750 [ 1760.814841] ? proc_reg_unlocked_ioctl+0x2c0/0x2c0 [ 1760.819820] ? __se_sys_copy_file_range+0x410/0x410 [ 1760.824842] ? fsnotify_first_mark+0x200/0x200 [ 1760.829446] ? mutex_trylock+0x1a0/0x1a0 [ 1760.833800] ? security_file_permission+0x1c0/0x220 [ 1760.838836] vfs_read+0x194/0x3c0 [ 1760.842386] ksys_read+0x12b/0x2a0 [ 1760.845931] ? kernel_write+0x110/0x110 [ 1760.850000] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1760.855028] ? do_syscall_64+0x21/0x620 [ 1760.859017] do_syscall_64+0xf9/0x620 [ 1760.859536] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1760.862891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.875593] RIP: 0033:0x4665d9 [ 1760.878782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1760.881288] EXT4-fs (loop3): mount failed [ 1760.897672] RSP: 002b:00007fb63fe2e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1760.897685] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1760.897691] RDX: 0000000000002020 RSI: 0000000020004780 RDI: 0000000000000003 [ 1760.897698] RBP: 00007fb63fe2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1760.897707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1760.897715] R13: 00007ffdf473f45f R14: 00007fb63fe2e300 R15: 0000000000022000 08:56:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200068, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1760.993028] FAULT_INJECTION: forcing a failure. [ 1760.993028] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.036929] CPU: 0 PID: 28505 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1761.045020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1761.054379] Call Trace: [ 1761.056977] dump_stack+0x1fc/0x2ef [ 1761.060611] should_fail.cold+0xa/0xf [ 1761.064410] ? setup_fault_attr+0x200/0x200 [ 1761.068735] ? lock_acquire+0x170/0x3c0 [ 1761.072737] __should_failslab+0x115/0x180 [ 1761.076973] should_failslab+0x5/0x10 [ 1761.080772] kmem_cache_alloc_trace+0x284/0x380 [ 1761.085450] apply_wqattrs_prepare+0x137/0xa50 [ 1761.090042] apply_workqueue_attrs_locked+0xc5/0x120 [ 1761.095145] __alloc_workqueue_key+0x510/0xed0 [ 1761.099750] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1761.104791] ext4_fill_super+0x6edb/0xc7f0 [ 1761.109134] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1761.114241] ? snprintf+0xbb/0xf0 [ 1761.117724] ? vsprintf+0x30/0x30 [ 1761.121196] ? wait_for_completion_io+0x10/0x10 [ 1761.126040] ? set_blocksize+0x163/0x3f0 [ 1761.130240] mount_bdev+0x2fc/0x3b0 [ 1761.133889] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1761.139067] mount_fs+0xa3/0x310 [ 1761.142432] vfs_kern_mount.part.0+0x68/0x470 [ 1761.146912] do_mount+0x113c/0x2f10 [ 1761.150528] ? cmp_ex_sort+0xc0/0xc0 [ 1761.154224] ? __do_page_fault+0x180/0xd60 [ 1761.158440] ? copy_mount_string+0x40/0x40 [ 1761.162660] ? memset+0x20/0x40 [ 1761.165919] ? copy_mount_options+0x26f/0x380 [ 1761.170408] ksys_mount+0xcf/0x130 [ 1761.174016] __x64_sys_mount+0xba/0x150 [ 1761.177994] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1761.182571] do_syscall_64+0xf9/0x620 [ 1761.186362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1761.191537] RIP: 0033:0x467afa [ 1761.194712] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1761.213603] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1761.221333] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1761.228582] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 08:56:50 executing program 0 (fault-call:1 fault-nth:2): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) [ 1761.235830] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1761.243178] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1761.250429] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1761.276884] EXT4-fs: failed to create workqueue [ 1761.333443] EXT4-fs (loop5): mount failed [ 1761.395577] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1761.415891] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1761.435759] EXT4-fs (loop3): mount failed [ 1761.486595] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1761.496994] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1761.516963] EXT4-fs (loop3): mount failed 08:56:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x200000000000000, 0x0) 08:56:51 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) 08:56:51 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20006a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1762.899123] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 08:56:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x43) [ 1762.945953] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1762.984028] FAULT_INJECTION: forcing a failure. [ 1762.984028] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.016689] EXT4-fs (loop3): mount failed 08:56:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x8a) [ 1763.048654] CPU: 1 PID: 28557 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1763.056563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.066093] Call Trace: [ 1763.068699] dump_stack+0x1fc/0x2ef [ 1763.072349] should_fail.cold+0xa/0xf [ 1763.076162] ? setup_fault_attr+0x200/0x200 [ 1763.080592] ? lock_acquire+0x170/0x3c0 [ 1763.084572] __should_failslab+0x115/0x180 [ 1763.088813] should_failslab+0x5/0x10 [ 1763.092630] kmem_cache_alloc_trace+0x284/0x380 [ 1763.097309] apply_wqattrs_prepare+0x137/0xa50 [ 1763.101997] apply_workqueue_attrs_locked+0xc5/0x120 [ 1763.107118] __alloc_workqueue_key+0x510/0xed0 [ 1763.111712] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1763.116752] ext4_fill_super+0x6edb/0xc7f0 [ 1763.121118] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1763.126249] ? snprintf+0xbb/0xf0 [ 1763.129717] ? vsprintf+0x30/0x30 [ 1763.133294] ? wait_for_completion_io+0x10/0x10 [ 1763.137965] ? set_blocksize+0x163/0x3f0 [ 1763.142038] mount_bdev+0x2fc/0x3b0 [ 1763.145673] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1763.150877] mount_fs+0xa3/0x310 [ 1763.154254] vfs_kern_mount.part.0+0x68/0x470 [ 1763.158756] do_mount+0x113c/0x2f10 [ 1763.162422] ? cmp_ex_sort+0xc0/0xc0 [ 1763.166152] ? __do_page_fault+0x180/0xd60 [ 1763.170392] ? copy_mount_string+0x40/0x40 [ 1763.174638] ? memset+0x20/0x40 [ 1763.177930] ? copy_mount_options+0x26f/0x380 [ 1763.182432] ksys_mount+0xcf/0x130 [ 1763.185976] __x64_sys_mount+0xba/0x150 [ 1763.189953] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1763.194563] do_syscall_64+0xf9/0x620 [ 1763.198389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1763.203579] RIP: 0033:0x467afa [ 1763.206769] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.225671] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1763.233657] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1763.240929] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1763.248458] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1763.255726] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1763.262990] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xd4) [ 1763.365724] EXT4-fs: failed to create workqueue [ 1763.374312] EXT4-fs (loop5): mount failed 08:56:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x11b) [ 1763.449345] FAT-fs (loop1): Unrecognized mount option "sho" or missing value [ 1763.482744] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 08:56:52 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x16a) [ 1763.512956] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1763.557686] EXT4-fs (loop3): mount failed [ 1763.631506] FAULT_INJECTION: forcing a failure. [ 1763.631506] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.647024] CPU: 1 PID: 28592 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1763.655139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.664614] Call Trace: [ 1763.667227] dump_stack+0x1fc/0x2ef [ 1763.670856] should_fail.cold+0xa/0xf [ 1763.674659] ? setup_fault_attr+0x200/0x200 [ 1763.678967] ? lock_acquire+0x170/0x3c0 [ 1763.682936] __should_failslab+0x115/0x180 [ 1763.687157] should_failslab+0x5/0x10 [ 1763.690949] kmem_cache_alloc_node+0x245/0x3b0 [ 1763.695520] alloc_unbound_pwq+0x4a4/0xc10 [ 1763.699758] apply_wqattrs_prepare+0x3c0/0xa50 [ 1763.704336] apply_workqueue_attrs_locked+0xc5/0x120 [ 1763.709629] __alloc_workqueue_key+0x510/0xed0 [ 1763.714228] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1763.719377] ext4_fill_super+0x6edb/0xc7f0 [ 1763.723628] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1763.728843] ? snprintf+0xbb/0xf0 [ 1763.732319] ? vsprintf+0x30/0x30 [ 1763.735761] ? wait_for_completion_io+0x10/0x10 [ 1763.740424] ? set_blocksize+0x163/0x3f0 [ 1763.744571] mount_bdev+0x2fc/0x3b0 [ 1763.748184] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1763.753271] mount_fs+0xa3/0x310 [ 1763.756624] vfs_kern_mount.part.0+0x68/0x470 [ 1763.761196] do_mount+0x113c/0x2f10 [ 1763.764820] ? cmp_ex_sort+0xc0/0xc0 [ 1763.768599] ? __do_page_fault+0x180/0xd60 [ 1763.772946] ? copy_mount_string+0x40/0x40 [ 1763.777193] ? memset+0x20/0x40 [ 1763.780609] ? copy_mount_options+0x26f/0x380 [ 1763.785216] ksys_mount+0xcf/0x130 [ 1763.789080] __x64_sys_mount+0xba/0x150 [ 1763.793067] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1763.797692] do_syscall_64+0xf9/0x620 [ 1763.801489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1763.806945] RIP: 0033:0x467afa [ 1763.810218] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.829256] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1763.837010] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1763.844268] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1763.851538] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1763.858790] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1763.866065] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1763.881697] EXT4-fs: failed to create workqueue [ 1763.886595] EXT4-fs (loop5): mount failed 08:56:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x8000000000000000, 0x0) 08:56:54 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x1ad) 08:56:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20006c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:54 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1765.917655] FAULT_INJECTION: forcing a failure. [ 1765.917655] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.929120] CPU: 1 PID: 28605 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1765.937015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.946374] Call Trace: [ 1765.948979] dump_stack+0x1fc/0x2ef [ 1765.952622] should_fail.cold+0xa/0xf [ 1765.956438] ? setup_fault_attr+0x200/0x200 [ 1765.960860] ? lock_acquire+0x170/0x3c0 08:56:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1765.964948] __should_failslab+0x115/0x180 [ 1765.969285] should_failslab+0x5/0x10 [ 1765.973098] kmem_cache_alloc_trace+0x284/0x380 [ 1765.977784] apply_wqattrs_prepare+0x137/0xa50 [ 1765.982390] apply_workqueue_attrs_locked+0xc5/0x120 [ 1765.987507] __alloc_workqueue_key+0x510/0xed0 [ 1765.992108] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1765.997169] ext4_fill_super+0x6edb/0xc7f0 [ 1766.001441] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1766.006570] ? snprintf+0xbb/0xf0 [ 1766.010129] ? vsprintf+0x30/0x30 [ 1766.013596] ? wait_for_completion_io+0x10/0x10 [ 1766.018275] ? set_blocksize+0x163/0x3f0 [ 1766.022354] mount_bdev+0x2fc/0x3b0 [ 1766.025990] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1766.031111] mount_fs+0xa3/0x310 [ 1766.034498] vfs_kern_mount.part.0+0x68/0x470 [ 1766.039020] do_mount+0x113c/0x2f10 [ 1766.042656] ? cmp_ex_sort+0xc0/0xc0 [ 1766.046378] ? __do_page_fault+0x180/0xd60 [ 1766.050626] ? copy_mount_string+0x40/0x40 [ 1766.054884] ? memset+0x20/0x40 [ 1766.058174] ? copy_mount_options+0x26f/0x380 [ 1766.062779] ksys_mount+0xcf/0x130 [ 1766.066327] __x64_sys_mount+0xba/0x150 [ 1766.070308] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1766.074901] do_syscall_64+0xf9/0x620 [ 1766.078710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1766.083906] RIP: 0033:0x467afa [ 1766.087103] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.106095] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1766.113900] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1766.121521] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1766.128914] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1766.136514] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1766.143789] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x1fd) [ 1766.207720] EXT4-fs: failed to create workqueue [ 1766.217018] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1766.230272] EXT4-fs (loop5): mount failed [ 1766.243279] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1766.260248] EXT4-fs (loop3): mount failed 08:56:55 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x24c) [ 1766.352082] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1766.363997] FAULT_INJECTION: forcing a failure. [ 1766.363997] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.377568] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:56:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2a0) [ 1766.407401] CPU: 1 PID: 28645 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1766.415322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.424792] Call Trace: [ 1766.426973] EXT4-fs (loop3): mount failed [ 1766.427487] dump_stack+0x1fc/0x2ef [ 1766.435345] should_fail.cold+0xa/0xf [ 1766.439163] ? setup_fault_attr+0x200/0x200 [ 1766.443499] ? lock_acquire+0x170/0x3c0 [ 1766.447496] __should_failslab+0x115/0x180 [ 1766.451744] should_failslab+0x5/0x10 [ 1766.455555] kmem_cache_alloc_node+0x245/0x3b0 [ 1766.460149] alloc_unbound_pwq+0x4a4/0xc10 [ 1766.464489] apply_wqattrs_prepare+0x3c0/0xa50 [ 1766.469093] apply_workqueue_attrs_locked+0xc5/0x120 [ 1766.474302] __alloc_workqueue_key+0x510/0xed0 [ 1766.478911] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1766.483967] ext4_fill_super+0x6edb/0xc7f0 [ 1766.488233] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1766.493469] ? snprintf+0xbb/0xf0 [ 1766.496926] ? vsprintf+0x30/0x30 [ 1766.500389] ? wait_for_completion_io+0x10/0x10 [ 1766.505097] ? set_blocksize+0x163/0x3f0 [ 1766.509167] mount_bdev+0x2fc/0x3b0 [ 1766.512801] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1766.517909] mount_fs+0xa3/0x310 [ 1766.521284] vfs_kern_mount.part.0+0x68/0x470 [ 1766.525800] do_mount+0x113c/0x2f10 [ 1766.529433] ? cmp_ex_sort+0xc0/0xc0 [ 1766.533150] ? __do_page_fault+0x180/0xd60 [ 1766.537404] ? copy_mount_string+0x40/0x40 [ 1766.541755] ? memset+0x20/0x40 [ 1766.545045] ? copy_mount_options+0x26f/0x380 [ 1766.549546] ksys_mount+0xcf/0x130 [ 1766.553093] __x64_sys_mount+0xba/0x150 [ 1766.557070] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1766.561655] do_syscall_64+0xf9/0x620 [ 1766.565554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1766.570746] RIP: 0033:0x467afa [ 1766.573939] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.592938] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1766.600748] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1766.608115] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1766.615387] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1766.622658] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1766.629955] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x33f) 08:56:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x382) [ 1766.687579] EXT4-fs: failed to create workqueue [ 1766.698913] EXT4-fs (loop5): mount failed [ 1766.802921] FAT-fs (loop1): Unrecognized mount option "sho" or missing value 08:56:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfeffffff00000000, 0x0) 08:56:57 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200074, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:56:57 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x3c9) 08:56:57 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:56:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1768.989210] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1769.012154] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:56:58 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x421) 08:56:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1769.071706] FAULT_INJECTION: forcing a failure. [ 1769.071706] name failslab, interval 1, probability 0, space 0, times 0 [ 1769.077727] EXT4-fs (loop3): mount failed 08:56:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1769.129468] CPU: 1 PID: 28682 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1769.137662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1769.147030] Call Trace: [ 1769.149649] dump_stack+0x1fc/0x2ef [ 1769.153296] should_fail.cold+0xa/0xf [ 1769.157119] ? setup_fault_attr+0x200/0x200 [ 1769.161449] ? lock_acquire+0x170/0x3c0 [ 1769.165463] __should_failslab+0x115/0x180 [ 1769.169707] should_failslab+0x5/0x10 [ 1769.173530] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1769.178641] init_rescuer+0xa1/0x370 [ 1769.182371] __alloc_workqueue_key+0xb56/0xed0 [ 1769.186970] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1769.192100] ext4_fill_super+0x6edb/0xc7f0 [ 1769.196364] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1769.201477] ? snprintf+0xbb/0xf0 [ 1769.204933] ? vsprintf+0x30/0x30 [ 1769.208392] ? wait_for_completion_io+0x10/0x10 [ 1769.213077] ? set_blocksize+0x163/0x3f0 [ 1769.217147] mount_bdev+0x2fc/0x3b0 [ 1769.220787] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1769.225904] mount_fs+0xa3/0x310 [ 1769.229283] vfs_kern_mount.part.0+0x68/0x470 [ 1769.233804] do_mount+0x113c/0x2f10 [ 1769.237436] ? cmp_ex_sort+0xc0/0xc0 [ 1769.241156] ? __do_page_fault+0x180/0xd60 [ 1769.245398] ? copy_mount_string+0x40/0x40 [ 1769.249645] ? memset+0x20/0x40 [ 1769.252933] ? copy_mount_options+0x26f/0x380 [ 1769.257435] ksys_mount+0xcf/0x130 [ 1769.260981] __x64_sys_mount+0xba/0x150 [ 1769.264960] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1769.269547] do_syscall_64+0xf9/0x620 [ 1769.273357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1769.278551] RIP: 0033:0x467afa [ 1769.281751] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1769.300834] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1769.308651] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1769.315924] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1769.323313] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1769.330586] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1769.337957] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:56:58 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x464) 08:56:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1769.405779] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1769.423334] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:56:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1769.456368] EXT4-fs (loop3): mount failed [ 1769.494157] EXT4-fs: failed to create workqueue [ 1769.499017] EXT4-fs (loop5): mount failed [ 1769.944544] FAT-fs (loop1): Unrecognized mount option "sho" or missing value 08:57:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xffffffff00000000, 0x0) 08:57:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 08:57:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x4a7) 08:57:01 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:01 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1772.106390] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1772.137897] FAULT_INJECTION: forcing a failure. [ 1772.137897] name failslab, interval 1, probability 0, space 0, times 0 08:57:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x4fd) [ 1772.149971] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1772.190228] CPU: 1 PID: 28748 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1772.198249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.207697] Call Trace: [ 1772.210303] dump_stack+0x1fc/0x2ef [ 1772.213997] should_fail.cold+0xa/0xf [ 1772.217826] ? setup_fault_attr+0x200/0x200 [ 1772.222170] __should_failslab+0x115/0x180 [ 1772.226451] should_failslab+0x5/0x10 [ 1772.230280] kmem_cache_alloc+0x277/0x370 [ 1772.234485] ? ext4_sync_fs+0x8d0/0x8d0 [ 1772.238477] ext4_alloc_inode+0x1a/0x630 [ 1772.242572] ? ext4_sync_fs+0x8d0/0x8d0 [ 1772.246579] alloc_inode+0x5d/0x180 [ 1772.250226] iget_locked+0x193/0x480 [ 1772.253960] __ext4_iget+0x271/0x3d30 [ 1772.257786] ? __alloc_workqueue_key+0x92d/0xed0 [ 1772.262655] ? ext4_get_projid+0x190/0x190 [ 1772.266906] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1772.271949] ext4_fill_super+0x6f83/0xc7f0 [ 1772.276314] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1772.281549] ? snprintf+0xbb/0xf0 [ 1772.285108] ? vsprintf+0x30/0x30 [ 1772.288606] ? wait_for_completion_io+0x10/0x10 [ 1772.293543] ? set_blocksize+0x163/0x3f0 [ 1772.297707] mount_bdev+0x2fc/0x3b0 [ 1772.301350] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1772.306549] mount_fs+0xa3/0x310 [ 1772.309939] vfs_kern_mount.part.0+0x68/0x470 [ 1772.314489] do_mount+0x113c/0x2f10 [ 1772.318126] ? cmp_ex_sort+0xc0/0xc0 [ 1772.321845] ? __do_page_fault+0x180/0xd60 [ 1772.326099] ? copy_mount_string+0x40/0x40 [ 1772.330442] ? memset+0x20/0x40 [ 1772.333729] ? copy_mount_options+0x26f/0x380 [ 1772.338244] ksys_mount+0xcf/0x130 [ 1772.341798] __x64_sys_mount+0xba/0x150 [ 1772.345781] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1772.350373] do_syscall_64+0xf9/0x620 [ 1772.354274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1772.359463] RIP: 0033:0x467afa [ 1772.362656] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1772.378052] EXT4-fs (loop3): mount failed [ 1772.381769] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1772.381782] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 08:57:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x54f) [ 1772.381791] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1772.381799] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1772.381808] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1772.381816] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1772.402947] EXT4-fs (loop5): get root inode failed 08:57:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1772.502300] EXT4-fs (loop5): mount failed 08:57:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x5a7) [ 1772.591474] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1772.638528] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1772.677791] EXT4-fs (loop3): mount failed 08:57:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x2) 08:57:04 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x60c) 08:57:04 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000b2, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:04 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1fffff, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:04 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1775.123885] ptrace attach of "/root/syz-executor.4"[28802] was attempted by "/root/syz-executor.4"[28804] [ 1775.155299] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 08:57:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x651) [ 1775.196078] FAULT_INJECTION: forcing a failure. [ 1775.196078] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.203081] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1775.258832] CPU: 1 PID: 28806 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1775.266838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1775.268372] EXT4-fs (loop3): mount failed [ 1775.276711] Call Trace: [ 1775.276733] dump_stack+0x1fc/0x2ef [ 1775.276754] should_fail.cold+0xa/0xf [ 1775.276771] ? __lock_acquire+0x6de/0x3ff0 [ 1775.276786] ? setup_fault_attr+0x200/0x200 [ 1775.276804] ? find_get_entry+0x4cd/0x8a0 [ 1775.276819] __should_failslab+0x115/0x180 [ 1775.276834] should_failslab+0x5/0x10 [ 1775.276851] kmem_cache_alloc+0x3f/0x370 [ 1775.316175] ? mempool_alloc+0x350/0x350 [ 1775.320244] mempool_alloc+0x146/0x350 [ 1775.324153] ? mempool_resize+0x790/0x790 [ 1775.328453] ? __find_get_block+0x7a6/0xde0 [ 1775.332891] ? lock_downgrade+0x720/0x720 [ 1775.337051] bio_alloc_bioset+0x389/0x5e0 [ 1775.341229] ? __find_get_block+0x9d6/0xde0 [ 1775.345553] ? bvec_alloc+0x2f0/0x2f0 [ 1775.349357] ? __find_get_block+0x314/0xde0 [ 1775.353698] submit_bh_wbc+0x141/0x760 [ 1775.357594] ll_rw_block+0x1ed/0x220 [ 1775.361317] __breadahead_gfp+0xb8/0x130 [ 1775.365382] ? __breadahead+0x130/0x130 [ 1775.369457] __ext4_get_inode_loc+0xc16/0x10f0 [ 1775.374061] ? iget_locked+0x154/0x480 [ 1775.377964] __ext4_iget+0x2e5/0x3d30 [ 1775.381780] ? __alloc_workqueue_key+0x92d/0xed0 [ 1775.386540] ? ext4_get_projid+0x190/0x190 [ 1775.390799] ext4_fill_super+0x6f83/0xc7f0 [ 1775.395088] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1775.400205] ? snprintf+0xbb/0xf0 [ 1775.403666] ? vsprintf+0x30/0x30 [ 1775.407133] ? wait_for_completion_io+0x10/0x10 [ 1775.411943] ? set_blocksize+0x163/0x3f0 [ 1775.416019] mount_bdev+0x2fc/0x3b0 [ 1775.419649] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1775.424769] mount_fs+0xa3/0x310 [ 1775.428182] vfs_kern_mount.part.0+0x68/0x470 [ 1775.432705] do_mount+0x113c/0x2f10 [ 1775.436342] ? cmp_ex_sort+0xc0/0xc0 [ 1775.440151] ? __do_page_fault+0x180/0xd60 [ 1775.444394] ? copy_mount_string+0x40/0x40 [ 1775.448643] ? memset+0x20/0x40 [ 1775.451931] ? copy_mount_options+0x26f/0x380 [ 1775.456441] ksys_mount+0xcf/0x130 [ 1775.459992] __x64_sys_mount+0xba/0x150 [ 1775.463976] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1775.468583] do_syscall_64+0xf9/0x620 [ 1775.472396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1775.477584] RIP: 0033:0x467afa [ 1775.480780] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1775.499684] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 08:57:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x6a4) [ 1775.507402] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1775.514799] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1775.522185] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1775.529488] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1775.536961] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1775.561054] ptrace attach of "/root/syz-executor.4"[28825] was attempted by "/root/syz-executor.4"[28826] [ 1775.580716] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1775.597085] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 08:57:04 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x6eb) [ 1775.607377] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1775.643683] EXT4-fs (loop5): mount failed 08:57:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x72e) [ 1775.660783] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1775.685385] EXT4-fs (loop3): mount failed 08:57:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x1000000) 08:57:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:07 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x775) 08:57:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000ba, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:07 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) [ 1778.195328] FAULT_INJECTION: forcing a failure. [ 1778.195328] name failslab, interval 1, probability 0, space 0, times 0 [ 1778.229877] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1778.240574] CPU: 1 PID: 28857 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1778.248472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1778.256563] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1778.257824] Call Trace: [ 1778.257849] dump_stack+0x1fc/0x2ef [ 1778.257871] should_fail.cold+0xa/0xf [ 1778.257887] ? __lock_acquire+0x6de/0x3ff0 [ 1778.257907] ? setup_fault_attr+0x200/0x200 [ 1778.289881] ? find_get_entry+0x4cd/0x8a0 [ 1778.294225] __should_failslab+0x115/0x180 [ 1778.297538] EXT4-fs (loop3): mount failed [ 1778.298572] should_failslab+0x5/0x10 [ 1778.298589] kmem_cache_alloc+0x3f/0x370 [ 1778.298605] ? mempool_alloc+0x350/0x350 [ 1778.298617] mempool_alloc+0x146/0x350 [ 1778.298638] ? mempool_resize+0x790/0x790 [ 1778.323360] ? __find_get_block+0x7a6/0xde0 [ 1778.327700] ? lock_downgrade+0x720/0x720 [ 1778.331861] bio_alloc_bioset+0x389/0x5e0 [ 1778.336034] ? __find_get_block+0x9d6/0xde0 [ 1778.340471] ? bvec_alloc+0x2f0/0x2f0 [ 1778.344277] ? __find_get_block+0x314/0xde0 [ 1778.348613] submit_bh_wbc+0x141/0x760 [ 1778.352517] ll_rw_block+0x1ed/0x220 [ 1778.356302] __breadahead_gfp+0xb8/0x130 [ 1778.360464] ? __breadahead+0x130/0x130 [ 1778.369271] __ext4_get_inode_loc+0xc16/0x10f0 [ 1778.373870] ? iget_locked+0x154/0x480 [ 1778.377774] __ext4_iget+0x2e5/0x3d30 [ 1778.381679] ? __alloc_workqueue_key+0x92d/0xed0 [ 1778.386443] ? ext4_get_projid+0x190/0x190 [ 1778.390709] ext4_fill_super+0x6f83/0xc7f0 [ 1778.394976] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1778.400093] ? snprintf+0xbb/0xf0 [ 1778.403554] ? vsprintf+0x30/0x30 [ 1778.407019] ? wait_for_completion_io+0x10/0x10 [ 1778.411737] ? set_blocksize+0x163/0x3f0 [ 1778.416507] mount_bdev+0x2fc/0x3b0 [ 1778.420608] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1778.425720] mount_fs+0xa3/0x310 [ 1778.429104] vfs_kern_mount.part.0+0x68/0x470 [ 1778.433619] do_mount+0x113c/0x2f10 [ 1778.437254] ? cmp_ex_sort+0xc0/0xc0 [ 1778.441067] ? __do_page_fault+0x180/0xd60 [ 1778.445308] ? copy_mount_string+0x40/0x40 [ 1778.449566] ? memset+0x20/0x40 [ 1778.452855] ? copy_mount_options+0x26f/0x380 [ 1778.457369] ksys_mount+0xcf/0x130 [ 1778.461354] __x64_sys_mount+0xba/0x150 [ 1778.465658] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1778.470339] do_syscall_64+0xf9/0x620 [ 1778.474165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1778.479357] RIP: 0033:0x467afa 08:57:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1778.482641] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1778.501636] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1778.509540] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1778.516818] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1778.524216] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1778.531668] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1778.539034] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:57:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x7c9) 08:57:07 executing program 5 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1778.564545] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1778.580816] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1778.602585] EXT4-fs (loop5): mount failed 08:57:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1778.712853] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1778.744045] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:57:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x81f) [ 1778.794960] EXT4-fs (loop3): mount failed [ 1778.822474] FAULT_INJECTION: forcing a failure. [ 1778.822474] name failslab, interval 1, probability 0, space 0, times 0 [ 1778.854240] CPU: 0 PID: 28896 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1778.862178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1778.871545] Call Trace: [ 1778.874155] dump_stack+0x1fc/0x2ef [ 1778.877802] should_fail.cold+0xa/0xf [ 1778.881617] ? __lock_acquire+0x6de/0x3ff0 [ 1778.885857] ? setup_fault_attr+0x200/0x200 [ 1778.890189] ? find_get_entry+0x4cd/0x8a0 [ 1778.894514] __should_failslab+0x115/0x180 [ 1778.898759] should_failslab+0x5/0x10 [ 1778.902573] kmem_cache_alloc+0x3f/0x370 [ 1778.906637] ? mempool_alloc+0x350/0x350 [ 1778.910804] mempool_alloc+0x146/0x350 [ 1778.914712] ? mempool_resize+0x790/0x790 [ 1778.918870] ? __find_get_block+0x7a6/0xde0 [ 1778.923209] ? lock_downgrade+0x720/0x720 [ 1778.927458] bio_alloc_bioset+0x389/0x5e0 [ 1778.931735] ? __find_get_block+0x9d6/0xde0 [ 1778.936072] ? bvec_alloc+0x2f0/0x2f0 [ 1778.939883] ? __find_get_block+0x314/0xde0 [ 1778.944316] submit_bh_wbc+0x141/0x760 [ 1778.948314] ll_rw_block+0x1ed/0x220 [ 1778.952036] __breadahead_gfp+0xb8/0x130 [ 1778.956101] ? __breadahead+0x130/0x130 [ 1778.960089] __ext4_get_inode_loc+0xc16/0x10f0 [ 1778.964702] ? iget_locked+0x154/0x480 [ 1778.968690] __ext4_iget+0x2e5/0x3d30 08:57:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000c4, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1778.972513] ? __alloc_workqueue_key+0x92d/0xed0 [ 1778.977288] ? ext4_get_projid+0x190/0x190 [ 1778.981554] ext4_fill_super+0x6f83/0xc7f0 [ 1778.986229] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1778.991783] ? snprintf+0xbb/0xf0 [ 1778.995241] ? vsprintf+0x30/0x30 [ 1778.998719] ? wait_for_completion_io+0x10/0x10 [ 1779.003482] ? set_blocksize+0x163/0x3f0 [ 1779.007653] mount_bdev+0x2fc/0x3b0 [ 1779.011385] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1779.016682] mount_fs+0xa3/0x310 [ 1779.020109] vfs_kern_mount.part.0+0x68/0x470 [ 1779.024978] do_mount+0x113c/0x2f10 [ 1779.028652] ? cmp_ex_sort+0xc0/0xc0 [ 1779.032386] ? __do_page_fault+0x180/0xd60 [ 1779.036629] ? copy_mount_string+0x40/0x40 [ 1779.040874] ? memset+0x20/0x40 [ 1779.044158] ? copy_mount_options+0x26f/0x380 [ 1779.048671] ksys_mount+0xcf/0x130 [ 1779.052302] __x64_sys_mount+0xba/0x150 [ 1779.056290] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1779.060899] do_syscall_64+0xf9/0x620 [ 1779.064717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1779.069958] RIP: 0033:0x467afa [ 1779.073161] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1779.092262] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1779.099978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1779.107425] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1779.115008] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1779.122460] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1779.129738] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1779.165143] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1779.175959] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1779.191126] EXT4-fs (loop5): mount failed [ 1779.267256] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1779.283952] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1779.307017] EXT4-fs (loop3): mount failed [ 1779.340051] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1779.351867] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1779.365723] EXT4-fs (loop3): mount failed 08:57:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x2000000) 08:57:10 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x882) 08:57:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:10 executing program 5 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000dc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x8c9) 08:57:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1781.243863] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1781.276130] FAULT_INJECTION: forcing a failure. [ 1781.276130] name failslab, interval 1, probability 0, space 0, times 0 08:57:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1781.305257] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1781.337718] CPU: 0 PID: 28947 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1781.345724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1781.355086] Call Trace: [ 1781.357691] dump_stack+0x1fc/0x2ef [ 1781.361334] should_fail.cold+0xa/0xf [ 1781.365182] ? setup_fault_attr+0x200/0x200 [ 1781.369525] ? blk_queue_exit+0x1cd/0x250 [ 1781.373687] ? generic_make_request+0x369/0xdf0 [ 1781.378370] __should_failslab+0x115/0x180 [ 1781.382710] should_failslab+0x5/0x10 [ 1781.386519] kmem_cache_alloc+0x3f/0x370 [ 1781.390591] ? mempool_alloc+0x350/0x350 [ 1781.394661] mempool_alloc+0x146/0x350 [ 1781.398734] ? submit_bio+0xb1/0x430 08:57:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xc06) [ 1781.399085] EXT4-fs (loop3): mount failed [ 1781.402455] ? mempool_resize+0x790/0x790 [ 1781.402473] ? generic_make_request+0xdf0/0xdf0 [ 1781.402490] ? check_preemption_disabled+0x41/0x280 [ 1781.402509] ? guard_bio_eod+0x2a0/0x650 [ 1781.402526] bio_alloc_bioset+0x389/0x5e0 [ 1781.402542] ? bvec_alloc+0x2f0/0x2f0 [ 1781.402554] ? __brelse+0x84/0xa0 [ 1781.402567] ? __breadahead_gfp+0xd4/0x130 [ 1781.402584] submit_bh_wbc+0x141/0x760 [ 1781.402603] __ext4_get_inode_loc+0x5c7/0x10f0 [ 1781.402621] ? iget_locked+0x154/0x480 [ 1781.452861] __ext4_iget+0x2e5/0x3d30 [ 1781.456687] ? __alloc_workqueue_key+0x92d/0xed0 [ 1781.461483] ? ext4_get_projid+0x190/0x190 [ 1781.465758] ext4_fill_super+0x6f83/0xc7f0 [ 1781.470072] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1781.475191] ? snprintf+0xbb/0xf0 [ 1781.478657] ? vsprintf+0x30/0x30 [ 1781.482139] ? wait_for_completion_io+0x10/0x10 [ 1781.486814] ? set_blocksize+0x163/0x3f0 [ 1781.490977] mount_bdev+0x2fc/0x3b0 [ 1781.494624] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1781.499847] mount_fs+0xa3/0x310 08:57:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x1b01) [ 1781.503237] vfs_kern_mount.part.0+0x68/0x470 [ 1781.507751] do_mount+0x113c/0x2f10 [ 1781.511824] ? cmp_ex_sort+0xc0/0xc0 [ 1781.515549] ? __do_page_fault+0x180/0xd60 [ 1781.519798] ? copy_mount_string+0x40/0x40 [ 1781.524056] ? memset+0x20/0x40 [ 1781.527352] ? copy_mount_options+0x26f/0x380 [ 1781.531879] ksys_mount+0xcf/0x130 [ 1781.535438] __x64_sys_mount+0xba/0x150 [ 1781.539598] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1781.544455] do_syscall_64+0xf9/0x620 [ 1781.548356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.553594] RIP: 0033:0x467afa [ 1781.556793] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1781.575704] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1781.583686] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1781.591017] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1781.598318] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1781.605713] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1781.612998] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1781.625102] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1781.636629] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1781.651420] EXT4-fs (loop5): mount failed [ 1781.695047] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1781.710431] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1781.726770] EXT4-fs (loop3): mount failed 08:57:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfeffffff) 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x1f08) 08:57:13 executing program 5 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000f4, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:13 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2025) [ 1784.256139] FAULT_INJECTION: forcing a failure. [ 1784.256139] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.283396] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1784.286274] CPU: 0 PID: 28996 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1784.301367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1784.310901] Call Trace: [ 1784.313505] dump_stack+0x1fc/0x2ef [ 1784.317187] should_fail.cold+0xa/0xf [ 1784.321090] ? __lock_acquire+0x6de/0x3ff0 [ 1784.325342] ? setup_fault_attr+0x200/0x200 [ 1784.329681] ? find_get_entry+0x4cd/0x8a0 [ 1784.333848] __should_failslab+0x115/0x180 [ 1784.338203] should_failslab+0x5/0x10 [ 1784.342017] kmem_cache_alloc+0x3f/0x370 [ 1784.346107] ? mempool_alloc+0x350/0x350 [ 1784.350177] mempool_alloc+0x146/0x350 [ 1784.354023] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1784.354070] ? mempool_resize+0x790/0x790 [ 1784.371581] ? __find_get_block+0x7a6/0xde0 [ 1784.375920] ? lock_downgrade+0x720/0x720 [ 1784.380072] bio_alloc_bioset+0x389/0x5e0 [ 1784.384229] ? __find_get_block+0x9d6/0xde0 [ 1784.388572] ? bvec_alloc+0x2f0/0x2f0 [ 1784.392381] ? __find_get_block+0x314/0xde0 [ 1784.396724] submit_bh_wbc+0x141/0x760 [ 1784.400630] ll_rw_block+0x1ed/0x220 08:57:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x202f) [ 1784.404362] __breadahead_gfp+0xb8/0x130 [ 1784.408443] ? __breadahead+0x130/0x130 [ 1784.412439] __ext4_get_inode_loc+0xc16/0x10f0 [ 1784.417043] ? iget_locked+0x154/0x480 [ 1784.420945] __ext4_iget+0x2e5/0x3d30 [ 1784.424771] ? __alloc_workqueue_key+0x92d/0xed0 [ 1784.429898] ? ext4_get_projid+0x190/0x190 [ 1784.434162] ext4_fill_super+0x6f83/0xc7f0 [ 1784.438442] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1784.443554] ? snprintf+0xbb/0xf0 [ 1784.447018] ? vsprintf+0x30/0x30 [ 1784.450484] ? wait_for_completion_io+0x10/0x10 [ 1784.455162] ? set_blocksize+0x163/0x3f0 [ 1784.459236] mount_bdev+0x2fc/0x3b0 [ 1784.462877] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1784.467994] mount_fs+0xa3/0x310 [ 1784.471378] vfs_kern_mount.part.0+0x68/0x470 [ 1784.473306] EXT4-fs (loop3): mount failed [ 1784.475883] do_mount+0x113c/0x2f10 [ 1784.475902] ? cmp_ex_sort+0xc0/0xc0 [ 1784.475920] ? __do_page_fault+0x180/0xd60 [ 1784.475938] ? copy_mount_string+0x40/0x40 [ 1784.496026] ? memset+0x20/0x40 [ 1784.499324] ? copy_mount_options+0x26f/0x380 [ 1784.503834] ksys_mount+0xcf/0x130 [ 1784.507497] __x64_sys_mount+0xba/0x150 [ 1784.511488] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1784.516095] do_syscall_64+0xf9/0x620 [ 1784.519913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1784.525111] RIP: 0033:0x467afa [ 1784.528308] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.547593] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2104) [ 1784.555311] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1784.562699] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1784.570066] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1784.577356] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1784.584642] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:57:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfffffffe) [ 1784.624930] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1784.635646] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1784.656651] EXT4-fs (loop5): mount failed 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2e07) 08:57:13 executing program 5 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1784.676033] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1784.736546] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:57:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x3f03) [ 1784.777881] EXT4-fs (loop3): mount failed [ 1784.799341] FAULT_INJECTION: forcing a failure. [ 1784.799341] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.826854] CPU: 1 PID: 29042 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1784.834775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1784.844148] Call Trace: [ 1784.846766] dump_stack+0x1fc/0x2ef [ 1784.850402] should_fail.cold+0xa/0xf [ 1784.854205] ? setup_fault_attr+0x200/0x200 [ 1784.858529] ? lock_acquire+0x170/0x3c0 [ 1784.862523] __should_failslab+0x115/0x180 [ 1784.866774] should_failslab+0x5/0x10 [ 1784.870577] kmem_cache_alloc+0x277/0x370 [ 1784.874744] __d_alloc+0x2b/0xa10 [ 1784.878209] d_make_root+0x3e/0x90 [ 1784.881753] ext4_fill_super+0x706e/0xc7f0 [ 1784.886010] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1784.891237] ? snprintf+0xbb/0xf0 [ 1784.894905] ? vsprintf+0x30/0x30 [ 1784.898374] ? wait_for_completion_io+0x10/0x10 [ 1784.903054] ? set_blocksize+0x163/0x3f0 [ 1784.907127] mount_bdev+0x2fc/0x3b0 [ 1784.910762] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1784.915875] mount_fs+0xa3/0x310 [ 1784.919255] vfs_kern_mount.part.0+0x68/0x470 [ 1784.923765] do_mount+0x113c/0x2f10 [ 1784.927421] ? cmp_ex_sort+0xc0/0xc0 [ 1784.931573] ? __do_page_fault+0x180/0xd60 [ 1784.935820] ? copy_mount_string+0x40/0x40 [ 1784.940075] ? memset+0x20/0x40 [ 1784.943366] ? copy_mount_options+0x26f/0x380 [ 1784.947870] ksys_mount+0xcf/0x130 [ 1784.951418] __x64_sys_mount+0xba/0x150 [ 1784.955400] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1784.960022] do_syscall_64+0xf9/0x620 [ 1784.963849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1784.969474] RIP: 0033:0x467afa [ 1784.972754] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.991665] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 08:57:14 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x4300) [ 1784.999389] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1785.007178] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1785.014453] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1785.021727] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1785.029006] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:57:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200106, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1785.053120] EXT4-fs (loop5): get root dentry failed [ 1785.096236] EXT4-fs (loop5): mount failed 08:57:14 executing program 5 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:14 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:14 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x4c02) [ 1785.202290] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1785.232994] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1785.276884] EXT4-fs (loop3): mount failed [ 1785.282959] FAULT_INJECTION: forcing a failure. [ 1785.282959] name failslab, interval 1, probability 0, space 0, times 0 [ 1785.301648] CPU: 0 PID: 29063 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1785.309648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1785.319013] Call Trace: [ 1785.321644] dump_stack+0x1fc/0x2ef [ 1785.325291] should_fail.cold+0xa/0xf [ 1785.329113] ? setup_fault_attr+0x200/0x200 [ 1785.333454] ? __lock_acquire+0x6de/0x3ff0 [ 1785.337705] __should_failslab+0x115/0x180 [ 1785.341955] should_failslab+0x5/0x10 [ 1785.345771] kmem_cache_alloc+0x3f/0x370 [ 1785.349840] ? mempool_alloc+0x350/0x350 [ 1785.353904] mempool_alloc+0x146/0x350 [ 1785.357814] ? mark_held_locks+0xf0/0xf0 [ 1785.361881] ? mempool_resize+0x790/0x790 [ 1785.366058] ? locked_inode_to_wb_and_lock_list+0x1d9/0x980 [ 1785.371783] bio_alloc_bioset+0x389/0x5e0 [ 1785.375943] ? bvec_alloc+0x2f0/0x2f0 [ 1785.379757] ? mark_held_locks+0xa6/0xf0 [ 1785.383822] ? __local_bh_enable_ip+0x159/0x270 [ 1785.388500] submit_bh_wbc+0x141/0x760 [ 1785.392485] __sync_dirty_buffer+0x14e/0x320 [ 1785.396927] ext4_commit_super+0x777/0xb90 [ 1785.401183] ext4_setup_super+0x584/0x9f0 [ 1785.405646] ext4_fill_super+0x70cd/0xc7f0 [ 1785.410265] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1785.415583] ? snprintf+0xbb/0xf0 [ 1785.419043] ? vsprintf+0x30/0x30 [ 1785.422508] ? wait_for_completion_io+0x10/0x10 [ 1785.427186] ? set_blocksize+0x163/0x3f0 [ 1785.431292] mount_bdev+0x2fc/0x3b0 [ 1785.434925] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1785.440044] mount_fs+0xa3/0x310 [ 1785.443453] vfs_kern_mount.part.0+0x68/0x470 [ 1785.447970] do_mount+0x113c/0x2f10 [ 1785.451619] ? cmp_ex_sort+0xc0/0xc0 [ 1785.455342] ? __do_page_fault+0x180/0xd60 [ 1785.459602] ? copy_mount_string+0x40/0x40 [ 1785.464031] ? memset+0x20/0x40 [ 1785.467318] ? copy_mount_options+0x26f/0x380 [ 1785.472184] ksys_mount+0xcf/0x130 [ 1785.475732] __x64_sys_mount+0xba/0x150 [ 1785.479800] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1785.484388] do_syscall_64+0xf9/0x620 [ 1785.488222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1785.493414] RIP: 0033:0x467afa [ 1785.496610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1785.515870] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1785.523766] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1785.531478] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1785.538757] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1785.546289] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1785.553846] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1785.596665] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1785.608305] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1785.623367] EXT4-fs (loop5): mount failed [ 1785.685647] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1785.707167] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1785.729243] EXT4-fs (loop3): mount failed 08:57:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x4f05) 08:57:16 executing program 5 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1787.497113] FAULT_INJECTION: forcing a failure. [ 1787.497113] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.509846] CPU: 0 PID: 29093 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1787.517833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1787.527484] Call Trace: [ 1787.530105] dump_stack+0x1fc/0x2ef [ 1787.533887] should_fail.cold+0xa/0xf [ 1787.537698] ? setup_fault_attr+0x200/0x200 [ 1787.542132] ? lock_acquire+0x170/0x3c0 [ 1787.546361] __should_failslab+0x115/0x180 [ 1787.550631] should_failslab+0x5/0x10 [ 1787.554507] kmem_cache_alloc+0x277/0x370 [ 1787.558647] __d_alloc+0x2b/0xa10 [ 1787.562092] d_make_root+0x3e/0x90 [ 1787.565645] ext4_fill_super+0x706e/0xc7f0 [ 1787.569883] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1787.574996] ? snprintf+0xbb/0xf0 [ 1787.578469] ? vsprintf+0x30/0x30 [ 1787.582012] ? wait_for_completion_io+0x10/0x10 [ 1787.586760] ? set_blocksize+0x163/0x3f0 [ 1787.590896] mount_bdev+0x2fc/0x3b0 [ 1787.594526] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1787.599860] mount_fs+0xa3/0x310 [ 1787.603229] vfs_kern_mount.part.0+0x68/0x470 [ 1787.607761] do_mount+0x113c/0x2f10 [ 1787.611668] ? cmp_ex_sort+0xc0/0xc0 [ 1787.615410] ? __do_page_fault+0x180/0xd60 [ 1787.619636] ? copy_mount_string+0x40/0x40 [ 1787.624211] ? memset+0x20/0x40 [ 1787.627547] ? copy_mount_options+0x26f/0x380 [ 1787.632039] ksys_mount+0xcf/0x130 [ 1787.635573] __x64_sys_mount+0xba/0x150 [ 1787.639544] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1787.644117] do_syscall_64+0xf9/0x620 [ 1787.647948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1787.653123] RIP: 0033:0x467afa [ 1787.656364] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.675252] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1787.682950] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1787.690295] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 08:57:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x100000000000000) 08:57:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200128, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:16 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x5106) [ 1787.697600] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1787.705204] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1787.712493] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1787.721608] EXT4-fs (loop5): get root dentry failed [ 1787.726660] EXT4-fs (loop5): mount failed 08:57:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x6404) 08:57:16 executing program 5 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1787.818375] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1787.845028] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:57:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x6a01) [ 1787.893308] EXT4-fs (loop3): mount failed [ 1787.946133] FAULT_INJECTION: forcing a failure. [ 1787.946133] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.970334] CPU: 0 PID: 29123 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1787.978350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1787.987811] Call Trace: [ 1787.990418] dump_stack+0x1fc/0x2ef [ 1787.994074] should_fail.cold+0xa/0xf [ 1787.998097] ? setup_fault_attr+0x200/0x200 [ 1788.002443] ? lock_acquire+0x170/0x3c0 [ 1788.006659] __should_failslab+0x115/0x180 [ 1788.010923] should_failslab+0x5/0x10 [ 1788.014750] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1788.019912] __kmalloc_node+0x38/0x70 [ 1788.023739] kvmalloc_node+0x61/0xf0 [ 1788.027477] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 1788.032253] ext4_mb_init+0x985/0x1790 [ 1788.036173] ext4_fill_super+0x7308/0xc7f0 [ 1788.040457] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1788.045757] ? snprintf+0xbb/0xf0 [ 1788.049233] ? vsprintf+0x30/0x30 [ 1788.052849] ? wait_for_completion_io+0x10/0x10 [ 1788.057725] ? set_blocksize+0x163/0x3f0 [ 1788.061807] mount_bdev+0x2fc/0x3b0 [ 1788.065454] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1788.070579] mount_fs+0xa3/0x310 [ 1788.073969] vfs_kern_mount.part.0+0x68/0x470 [ 1788.078488] do_mount+0x113c/0x2f10 [ 1788.082161] ? cmp_ex_sort+0xc0/0xc0 [ 1788.085899] ? __do_page_fault+0x180/0xd60 [ 1788.090157] ? copy_mount_string+0x40/0x40 [ 1788.094531] ? memset+0x20/0x40 [ 1788.097829] ? copy_mount_options+0x26f/0x380 [ 1788.102523] ksys_mount+0xcf/0x130 [ 1788.106097] __x64_sys_mount+0xba/0x150 [ 1788.110280] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1788.114884] do_syscall_64+0xf9/0x620 [ 1788.118729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1788.123955] RIP: 0033:0x467afa [ 1788.127167] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:57:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20013a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1788.146527] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1788.154374] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1788.161661] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1788.169378] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1788.176659] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1788.183945] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:57:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x7507) [ 1788.294994] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1788.349391] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1788.399633] EXT4-fs (loop3): mount failed [ 1788.417707] EXT4-fs (loop5): can't allocate buddy meta group [ 1788.426024] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1788.436143] EXT4-fs (loop5): mount failed [ 1788.540561] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1788.567677] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1788.583718] EXT4-fs (loop3): mount failed 08:57:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x8203) 08:57:19 executing program 5 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1790.499946] FAULT_INJECTION: forcing a failure. [ 1790.499946] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.511800] CPU: 1 PID: 29170 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1790.520542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1790.529993] Call Trace: [ 1790.532601] dump_stack+0x1fc/0x2ef [ 1790.536258] should_fail.cold+0xa/0xf [ 1790.540074] ? __lock_acquire+0x6de/0x3ff0 [ 1790.544414] ? setup_fault_attr+0x200/0x200 [ 1790.548761] ? find_get_entry+0x4cd/0x8a0 [ 1790.553012] __should_failslab+0x115/0x180 [ 1790.557254] should_failslab+0x5/0x10 [ 1790.561054] kmem_cache_alloc+0x3f/0x370 [ 1790.565234] ? mempool_alloc+0x350/0x350 [ 1790.569545] mempool_alloc+0x146/0x350 [ 1790.573442] ? mempool_resize+0x790/0x790 [ 1790.577597] ? __find_get_block+0x7a6/0xde0 [ 1790.581925] ? lock_downgrade+0x720/0x720 [ 1790.586336] bio_alloc_bioset+0x389/0x5e0 [ 1790.590568] ? __find_get_block+0x9d6/0xde0 [ 1790.594900] ? bvec_alloc+0x2f0/0x2f0 [ 1790.599070] ? __find_get_block+0x314/0xde0 [ 1790.603487] submit_bh_wbc+0x141/0x760 [ 1790.607384] ll_rw_block+0x1ed/0x220 [ 1790.611471] __breadahead_gfp+0xb8/0x130 [ 1790.615730] ? __breadahead+0x130/0x130 [ 1790.619874] __ext4_get_inode_loc+0xc16/0x10f0 [ 1790.624457] ? iget_locked+0x154/0x480 [ 1790.628457] __ext4_iget+0x2e5/0x3d30 [ 1790.632395] ? __alloc_workqueue_key+0x92d/0xed0 [ 1790.637247] ? ext4_get_projid+0x190/0x190 [ 1790.641495] ext4_fill_super+0x6f83/0xc7f0 [ 1790.645832] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1790.651257] ? snprintf+0xbb/0xf0 [ 1790.654769] ? vsprintf+0x30/0x30 [ 1790.658245] ? wait_for_completion_io+0x10/0x10 [ 1790.662923] ? set_blocksize+0x163/0x3f0 [ 1790.667089] mount_bdev+0x2fc/0x3b0 [ 1790.670719] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1790.675823] mount_fs+0xa3/0x310 [ 1790.679254] vfs_kern_mount.part.0+0x68/0x470 [ 1790.683743] do_mount+0x113c/0x2f10 [ 1790.687508] ? cmp_ex_sort+0xc0/0xc0 [ 1790.691325] ? __do_page_fault+0x180/0xd60 [ 1790.695561] ? copy_mount_string+0x40/0x40 [ 1790.699914] ? memset+0x20/0x40 [ 1790.703304] ? copy_mount_options+0x26f/0x380 [ 1790.708028] ksys_mount+0xcf/0x130 [ 1790.711577] __x64_sys_mount+0xba/0x150 [ 1790.715572] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1790.720145] do_syscall_64+0xf9/0x620 [ 1790.723942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1790.729227] RIP: 0033:0x467afa [ 1790.732411] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.751303] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1790.759012] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1790.766643] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1790.773965] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1790.781331] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1790.788821] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 08:57:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x200000000000000) 08:57:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20014c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:19 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x8208) [ 1790.835061] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1790.862146] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 08:57:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x8a00) [ 1790.906860] EXT4-fs (loop5): mount failed 08:57:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xa002) 08:57:19 executing program 5 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1790.979175] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1791.005536] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:57:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xa406) [ 1791.077313] EXT4-fs (loop3): mount failed [ 1791.165381] FAULT_INJECTION: forcing a failure. [ 1791.165381] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.166101] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1791.195691] CPU: 0 PID: 29203 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1791.203787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1791.213243] Call Trace: [ 1791.215891] dump_stack+0x1fc/0x2ef [ 1791.219538] should_fail.cold+0xa/0xf [ 1791.222327] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1791.223351] ? setup_fault_attr+0x200/0x200 [ 1791.223366] ? __kmalloc_node+0x38/0x70 [ 1791.223391] __should_failslab+0x115/0x180 [ 1791.249434] should_failslab+0x5/0x10 [ 1791.253252] kmem_cache_alloc+0x277/0x370 [ 1791.257412] ? ext4_sync_fs+0x8d0/0x8d0 [ 1791.261455] ext4_alloc_inode+0x1a/0x630 [ 1791.262745] EXT4-fs (loop3): mount failed [ 1791.265611] ? ext4_sync_fs+0x8d0/0x8d0 [ 1791.265626] alloc_inode+0x5d/0x180 [ 1791.265640] new_inode+0x1d/0xf0 [ 1791.265655] ext4_mb_init+0xa89/0x1790 [ 1791.284936] ext4_fill_super+0x7308/0xc7f0 [ 1791.289295] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1791.294501] ? snprintf+0xbb/0xf0 [ 1791.297964] ? vsprintf+0x30/0x30 [ 1791.301430] ? wait_for_completion_io+0x10/0x10 [ 1791.306105] ? set_blocksize+0x163/0x3f0 [ 1791.310185] mount_bdev+0x2fc/0x3b0 [ 1791.313823] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1791.319048] mount_fs+0xa3/0x310 [ 1791.322431] vfs_kern_mount.part.0+0x68/0x470 [ 1791.327032] do_mount+0x113c/0x2f10 [ 1791.330756] ? cmp_ex_sort+0xc0/0xc0 [ 1791.334482] ? __do_page_fault+0x180/0xd60 [ 1791.338737] ? copy_mount_string+0x40/0x40 [ 1791.343199] ? memset+0x20/0x40 [ 1791.346578] ? copy_mount_options+0x26f/0x380 [ 1791.351263] ksys_mount+0xcf/0x130 [ 1791.354817] __x64_sys_mount+0xba/0x150 [ 1791.358975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1791.363803] do_syscall_64+0xf9/0x620 [ 1791.367620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1791.372814] RIP: 0033:0x467afa [ 1791.376012] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.395011] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1791.403307] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa 08:57:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xa704) [ 1791.410718] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1791.418028] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1791.425414] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1791.432703] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1791.474686] EXT4-fs (loop5): can't get new inode [ 1791.482504] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1791.488835] EXT4-fs (loop5): mount failed [ 1792.761537] ieee802154 phy0 wpan0: encryption failed: -22 08:57:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xa705) 08:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200160, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1793.535025] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1793.558416] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1793.573934] EXT4-fs (loop3): mount failed [ 1793.633826] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1793.647132] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1793.664449] EXT4-fs (loop3): mount failed 08:57:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x8000000000000000) 08:57:22 executing program 5 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:22 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xad01) 08:57:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200192, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1793.937266] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1793.975571] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:57:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xc903) [ 1794.014083] FAULT_INJECTION: forcing a failure. [ 1794.014083] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.017148] EXT4-fs (loop3): mount failed [ 1794.051439] CPU: 0 PID: 29270 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1794.059368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1794.068732] Call Trace: [ 1794.071339] dump_stack+0x1fc/0x2ef [ 1794.074983] should_fail.cold+0xa/0xf [ 1794.078852] ? setup_fault_attr+0x200/0x200 [ 1794.083189] ? lock_acquire+0x170/0x3c0 [ 1794.087362] __should_failslab+0x115/0x180 [ 1794.091618] should_failslab+0x5/0x10 [ 1794.095429] kmem_cache_alloc+0x277/0x370 [ 1794.099589] add_system_zone+0x10e/0x690 [ 1794.103745] ? ext4_bg_num_gdb+0x172/0x250 [ 1794.107995] ext4_setup_system_zone+0x36c/0xa10 [ 1794.112681] ? ext4_exit_system_zone+0x20/0x20 [ 1794.117276] ? ext4_setup_super+0x5f3/0x9f0 [ 1794.121608] ext4_fill_super+0x72e0/0xc7f0 [ 1794.125913] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1794.131035] ? snprintf+0xbb/0xf0 [ 1794.134504] ? vsprintf+0x30/0x30 [ 1794.137974] ? wait_for_completion_io+0x10/0x10 [ 1794.142651] ? set_blocksize+0x163/0x3f0 [ 1794.146833] mount_bdev+0x2fc/0x3b0 [ 1794.150469] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1794.155576] mount_fs+0xa3/0x310 [ 1794.158955] vfs_kern_mount.part.0+0x68/0x470 [ 1794.163468] do_mount+0x113c/0x2f10 [ 1794.167114] ? copy_mount_string+0x40/0x40 [ 1794.171359] ? memset+0x20/0x40 [ 1794.174645] ? copy_mount_options+0x26f/0x380 [ 1794.179150] ksys_mount+0xcf/0x130 [ 1794.182695] __x64_sys_mount+0xba/0x150 [ 1794.186799] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1794.191521] do_syscall_64+0xf9/0x620 [ 1794.195331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1794.200529] RIP: 0033:0x467afa [ 1794.203734] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1794.223694] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1794.231503] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1794.238785] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1794.246337] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1794.253836] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:57:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xc907) [ 1794.261112] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1794.274569] EXT4-fs error (device loop5): ext4_quota_enable:5838: comm syz-executor.5: Bad quota inode # 4 [ 1794.285108] EXT4-fs warning (device loop5): ext4_enable_quotas:5875: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 1794.300303] EXT4-fs (loop5): mount failed 08:57:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xc908) 08:57:23 executing program 5 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1794.407479] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1794.438560] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1794.490193] EXT4-fs (loop3): mount failed [ 1794.511632] FAULT_INJECTION: forcing a failure. [ 1794.511632] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.529512] CPU: 1 PID: 29297 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1794.537627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1794.547115] Call Trace: [ 1794.549733] dump_stack+0x1fc/0x2ef [ 1794.553649] should_fail.cold+0xa/0xf [ 1794.557475] ? setup_fault_attr+0x200/0x200 [ 1794.561912] ? lock_acquire+0x170/0x3c0 [ 1794.566087] __should_failslab+0x115/0x180 [ 1794.570338] should_failslab+0x5/0x10 [ 1794.574161] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1794.579297] __kmalloc_node+0x38/0x70 [ 1794.583112] kvmalloc_node+0x61/0xf0 [ 1794.586973] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 1794.591946] ext4_mb_init+0x985/0x1790 [ 1794.595843] ext4_fill_super+0x7308/0xc7f0 [ 1794.600110] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1794.605212] ? snprintf+0xbb/0xf0 [ 1794.608766] ? vsprintf+0x30/0x30 [ 1794.612425] ? wait_for_completion_io+0x10/0x10 [ 1794.617088] ? set_blocksize+0x163/0x3f0 [ 1794.621150] mount_bdev+0x2fc/0x3b0 [ 1794.624774] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1794.630050] mount_fs+0xa3/0x310 [ 1794.633474] vfs_kern_mount.part.0+0x68/0x470 [ 1794.637968] do_mount+0x113c/0x2f10 [ 1794.641622] ? cmp_ex_sort+0xc0/0xc0 [ 1794.645526] ? __do_page_fault+0x180/0xd60 [ 1794.649760] ? copy_mount_string+0x40/0x40 [ 1794.654027] ? memset+0x20/0x40 [ 1794.657494] ? copy_mount_options+0x26f/0x380 [ 1794.661983] ksys_mount+0xcf/0x130 [ 1794.665631] __x64_sys_mount+0xba/0x150 [ 1794.669683] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1794.674377] do_syscall_64+0xf9/0x620 [ 1794.678175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1794.683463] RIP: 0033:0x467afa [ 1794.686816] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1794.706058] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1794.714149] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1794.721501] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1794.729307] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1794.736622] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1794.744119] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1794.833703] EXT4-fs (loop5): can't allocate buddy meta group [ 1794.856008] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1794.863915] EXT4-fs (loop5): mount failed 08:57:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001a8, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xd400) 08:57:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1796.565168] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1796.576204] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1796.593190] EXT4-fs (loop3): mount failed [ 1796.659808] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1796.674682] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1796.688709] EXT4-fs (loop3): mount failed 08:57:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfeffffff00000000) 08:57:25 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:25 executing program 5 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xeb06) 08:57:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001cc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xfd01) [ 1797.009013] FAULT_INJECTION: forcing a failure. [ 1797.009013] name failslab, interval 1, probability 0, space 0, times 0 [ 1797.046608] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1797.077000] CPU: 0 PID: 29341 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1797.085201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1797.094584] Call Trace: [ 1797.097189] dump_stack+0x1fc/0x2ef [ 1797.101043] should_fail.cold+0xa/0xf [ 1797.104925] ? setup_fault_attr+0x200/0x200 [ 1797.109452] ? lock_acquire+0x170/0x3c0 [ 1797.113567] __should_failslab+0x115/0x180 [ 1797.118001] should_failslab+0x5/0x10 [ 1797.121808] __kmalloc+0x2ab/0x3c0 [ 1797.125514] ? ext4_mb_init+0x92/0x1790 [ 1797.129510] ext4_mb_init+0x92/0x1790 [ 1797.133326] ? ext4_setup_super+0x5f3/0x9f0 [ 1797.137668] ext4_fill_super+0x7308/0xc7f0 [ 1797.141933] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1797.147059] ? snprintf+0xbb/0xf0 [ 1797.150523] ? vsprintf+0x30/0x30 [ 1797.154386] ? wait_for_completion_io+0x10/0x10 [ 1797.159075] ? set_blocksize+0x163/0x3f0 [ 1797.163144] mount_bdev+0x2fc/0x3b0 [ 1797.166783] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1797.171984] mount_fs+0xa3/0x310 [ 1797.175366] vfs_kern_mount.part.0+0x68/0x470 [ 1797.179871] do_mount+0x113c/0x2f10 [ 1797.183504] ? cmp_ex_sort+0xc0/0xc0 [ 1797.187223] ? __do_page_fault+0x180/0xd60 [ 1797.191464] ? copy_mount_string+0x40/0x40 [ 1797.195716] ? memset+0x20/0x40 [ 1797.198999] ? copy_mount_options+0x26f/0x380 [ 1797.203499] ksys_mount+0xcf/0x130 [ 1797.207327] __x64_sys_mount+0xba/0x150 [ 1797.211395] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1797.215983] do_syscall_64+0xf9/0x620 [ 1797.220045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.225234] RIP: 0033:0x467afa [ 1797.228429] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1797.248571] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1797.256382] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1797.263661] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1797.270948] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 08:57:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0xfd04) [ 1797.278221] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1797.285490] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1797.314297] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1797.378016] EXT4-fs (loop3): mount failed 08:57:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001f0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x200067a0) [ 1797.439644] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1797.481750] EXT4-fs (loop5): mount failed [ 1797.497747] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 08:57:26 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) io_getevents(r1, 0x9, 0x3, &(0x7f0000002040)=[{}, {}, {}], 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000020c0)) openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002100), 0x20000, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002140), 0x8000, 0x0) read$FUSE(r4, &(0x7f0000002180)={0x2020}, 0x2020) [ 1797.519273] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1797.549508] EXT4-fs (loop3): mount failed 08:57:26 executing program 5 (fault-call:0 fault-nth:94): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1797.652322] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1797.679824] FAULT_INJECTION: forcing a failure. [ 1797.679824] name failslab, interval 1, probability 0, space 0, times 0 [ 1797.693229] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1797.742542] CPU: 0 PID: 29385 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1797.750274] EXT4-fs (loop3): mount failed [ 1797.750470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1797.750476] Call Trace: [ 1797.750498] dump_stack+0x1fc/0x2ef [ 1797.750518] should_fail.cold+0xa/0xf [ 1797.750537] ? setup_fault_attr+0x200/0x200 [ 1797.750549] ? __kmalloc_node+0x38/0x70 [ 1797.750567] __should_failslab+0x115/0x180 [ 1797.786677] should_failslab+0x5/0x10 [ 1797.790579] kmem_cache_alloc+0x277/0x370 [ 1797.794744] ? ext4_sync_fs+0x8d0/0x8d0 [ 1797.798742] ext4_alloc_inode+0x1a/0x630 [ 1797.802824] ? ext4_sync_fs+0x8d0/0x8d0 [ 1797.804378] dlm: non-version read from control device 8224 [ 1797.807247] alloc_inode+0x5d/0x180 [ 1797.807261] new_inode+0x1d/0xf0 [ 1797.807277] ext4_mb_init+0xa89/0x1790 [ 1797.823755] ext4_fill_super+0x7308/0xc7f0 [ 1797.828020] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1797.833130] ? snprintf+0xbb/0xf0 [ 1797.836587] ? vsprintf+0x30/0x30 [ 1797.840051] ? wait_for_completion_io+0x10/0x10 [ 1797.844724] ? set_blocksize+0x163/0x3f0 [ 1797.848793] mount_bdev+0x2fc/0x3b0 [ 1797.852433] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1797.857547] mount_fs+0xa3/0x310 [ 1797.860928] vfs_kern_mount.part.0+0x68/0x470 [ 1797.865445] do_mount+0x113c/0x2f10 [ 1797.869085] ? cmp_ex_sort+0xc0/0xc0 [ 1797.872845] ? __do_page_fault+0x180/0xd60 [ 1797.877088] ? copy_mount_string+0x40/0x40 [ 1797.881351] ? memset+0x20/0x40 [ 1797.884640] ? copy_mount_options+0x26f/0x380 [ 1797.889155] ksys_mount+0xcf/0x130 [ 1797.892705] __x64_sys_mount+0xba/0x150 [ 1797.896688] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1797.901277] do_syscall_64+0xf9/0x620 [ 1797.905088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.910282] RIP: 0033:0x467afa [ 1797.913483] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1797.932533] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1797.932548] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1797.932556] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1797.932569] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1797.962193] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1797.969470] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1797.979132] EXT4-fs (loop5): can't get new inode [ 1797.984568] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1797.991279] EXT4-fs (loop5): mount failed [ 1798.012770] dlm: non-version read from control device 8224 08:57:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6, &(0x7f0000000500)="f47970da7c2f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:57:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8, &(0x7f0000000500)="f47970da7c2fd541"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffffffff00000000) 08:57:28 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d63703836362c696f636861727365743d69736ff9c835392d312c74696d655f6f66667365743d3078666666"]) 08:57:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2001fc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:28 executing program 5 (fault-call:0 fault-nth:95): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:28 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) [ 1800.029239] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1800.050647] FAULT_INJECTION: forcing a failure. [ 1800.050647] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.083599] CPU: 0 PID: 29415 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1800.091869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1800.101499] Call Trace: [ 1800.104231] dump_stack+0x1fc/0x2ef [ 1800.107899] should_fail.cold+0xa/0xf [ 1800.111807] ? setup_fault_attr+0x200/0x200 [ 1800.116230] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1800.121356] __should_failslab+0x115/0x180 [ 1800.125605] should_failslab+0x5/0x10 [ 1800.129429] __kmalloc+0x2ab/0x3c0 08:57:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) dup(r0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000004300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000004200)={0x50, 0x0, r3}, 0x50) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(0x0, 0x0, r6) setxattr$system_posix_acl(&(0x7f0000000340)='./file2\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}, {0x2, 0x3}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x6, r5}], {0x4, 0x4}, [{0x8, 0x1, r6}], {0x10, 0xe}}, 0x4c, 0x1) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000000)={0xb8, 0x0, r3, [{{0x6, 0x3, 0x8e5, 0xfffffffffffff801, 0x20, 0x0, {0x5, 0x3, 0x2, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0xffff50f3, 0x10001, 0xc000, 0x9000, r1, r6, 0x80, 0xfffffff9}}, {0x0, 0x2b2, 0xb, 0xdca9, '/proc/keys\x00'}}]}, 0xb8) [ 1800.132978] ? ext4_mb_add_groupinfo+0x160/0xe90 [ 1800.137749] ext4_mb_add_groupinfo+0x160/0xe90 [ 1800.142605] ? ext4_get_group_desc+0x29c/0x4e0 [ 1800.147315] ext4_mb_init+0xb58/0x1790 [ 1800.151256] ext4_fill_super+0x7308/0xc7f0 [ 1800.155520] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1800.160633] ? snprintf+0xbb/0xf0 [ 1800.164088] ? vsprintf+0x30/0x30 [ 1800.167567] ? wait_for_completion_io+0x10/0x10 [ 1800.172238] ? set_blocksize+0x163/0x3f0 [ 1800.176311] mount_bdev+0x2fc/0x3b0 [ 1800.179958] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1800.185070] mount_fs+0xa3/0x310 [ 1800.188452] vfs_kern_mount.part.0+0x68/0x470 [ 1800.193053] do_mount+0x113c/0x2f10 [ 1800.196691] ? cmp_ex_sort+0xc0/0xc0 [ 1800.200415] ? __do_page_fault+0x180/0xd60 [ 1800.204659] ? copy_mount_string+0x40/0x40 [ 1800.208913] ? memset+0x20/0x40 [ 1800.212202] ? copy_mount_options+0x26f/0x380 [ 1800.216729] ksys_mount+0xcf/0x130 [ 1800.220283] __x64_sys_mount+0xba/0x150 [ 1800.224265] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1800.228859] do_syscall_64+0xf9/0x620 [ 1800.232671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1800.237865] RIP: 0033:0x467afa [ 1800.241060] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.259957] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1800.267667] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1800.274934] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1800.282204] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1800.289471] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1800.296740] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1800.320074] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1800.363792] EXT4-fs (loop3): mount failed 08:57:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(0x0, 0x0, r4) setxattr$system_posix_acl(&(0x7f0000000340)='./file2\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}, {0x2, 0x3}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x6}], {0x4, 0x4}, [{0x8, 0x1, r4}], {0x10, 0xe}}, 0x4c, 0x1) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r6, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) chown(0x0, 0x0, r9) setxattr$system_posix_acl(&(0x7f0000000340)='./file2\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}, {0x2, 0x3}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x6, r8}], {0x4, 0x4}, [{0x8, 0x1, r9}], {0x10, 0xe}}, 0x4c, 0x1) r10 = geteuid() read$FUSE(r0, &(0x7f00000067c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r12, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r13, 0x0) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f0000003140)={&(0x7f0000002000)={0x50, 0xfffffffffffffff5, 0x6, {0x7, 0x21, 0xf0, 0x800040, 0x5, 0x4, 0xdf}}, &(0x7f0000002080)={0x18, 0x0, 0x100000000, {0x7}}, &(0x7f00000020c0)={0x18, 0x2f, 0x400, {0x9}}, &(0x7f0000002100)={0x18, 0x0, 0x13}, &(0x7f0000002140)={0x18, 0x0, 0x0, {0x3}}, &(0x7f0000002180)={0x28, 0x0, 0x1, {{0x2491, 0x3f, 0x1, r3}}}, &(0x7f00000021c0)={0x60, 0x0, 0x2, {{0x3f, 0x6, 0x1a8d, 0x1, 0x8001, 0x8, 0xfffffffe, 0xffffffff}}}, &(0x7f0000002240)={0x18, 0x0, 0x1, {0x20}}, &(0x7f0000002300)=ANY=[@ANYBLOB="37586664241bcedd3f8b2f83c388160000000b000000085d212d2a00"], &(0x7f00000022c0)={0x20, 0x0, 0x48, {0x0, 0x1a}}, &(0x7f0000002440)={0x78, 0x0, 0x4, {0xffffffffffff1b91, 0x2, 0x0, {0x3, 0x4, 0x8, 0x7, 0x5, 0x7, 0x0, 0x4, 0x4, 0x1000, 0x0, r1, 0x0, 0x4, 0x8}}}, &(0x7f0000002600)={0x90, 0x0, 0x400, {0x0, 0x3, 0x1, 0xfffffffffffffff8, 0xfffffffb, 0x8, {0x0, 0x0, 0x8, 0x9, 0xffffffffffffffc1, 0xcbc, 0x3, 0x1, 0x84, 0x0, 0x6, 0x0, r2, 0x4, 0x6}}}, &(0x7f00000026c0)={0xf8, 0x0, 0x0, [{0x3, 0xaa, 0x1, 0x3, '-'}, {0x2, 0x800, 0x1, 0x4, '@'}, {0x0, 0x5, 0xb, 0x400, '/proc/keys\x00'}, {0x6, 0xfffffffffffffc01, 0x2, 0x40, '(('}, {0x1, 0xffffffff, 0x1, 0x4, '{'}, {0x4, 0x10000, 0x8, 0x10001, '!\'\'&#-*]'}, {0x2, 0x8001, 0x1, 0xaf, ','}]}, &(0x7f00000029c0)={0x660, 0x0, 0x10001, [{{0x1, 0x2, 0x3ff, 0xfff, 0x2, 0x6, {0x5, 0x5, 0xc37, 0x9, 0x7, 0x0, 0x8001, 0x4, 0x6, 0x1000, 0x1, r1, r2, 0x1000, 0xf7fffffe}}, {0x2, 0x73, 0x6, 0xfffffff9, ':@!\xa8}-'}}, {{0x6, 0x0, 0x656, 0x4, 0x1ff, 0x312, {0x6, 0x81, 0x8001, 0x5, 0x32c, 0x9568, 0x0, 0xb2a4, 0x8001, 0xc000, 0x9, 0x0, r2, 0x2, 0x1}}, {0x3, 0xfffffffffffffff8, 0x5, 0x1, '\'\\%]\x00'}}, {{0x2, 0x2, 0x5, 0x245d, 0x3, 0x0, {0x5, 0x100, 0x9, 0x9, 0x2, 0x5ac, 0x3ff, 0x7ff, 0x10001, 0x2000, 0x5, 0x0, 0x0, 0x3, 0x200}}, {0x0, 0xfff, 0x8, 0x800, '%\'\x10/\'}#\''}}, {{0x2, 0x3, 0xffffffff, 0xda0d, 0x5, 0x1f, {0x4, 0x8, 0x7ff, 0x3, 0x81, 0x800, 0x4510, 0x5, 0x18, 0xa000, 0x0, 0xee01, r2, 0x5, 0x2}}, {0x3, 0x10000, 0xb, 0x2, '/proc/keys\x00'}}, {{0x1, 0x0, 0x4, 0x7, 0x8, 0x7, {0x2, 0x8001, 0x5, 0x5, 0xfffffffffffffffa, 0x0, 0xe834, 0x8, 0x3, 0xc000, 0x6, 0x0, r2, 0xcc00, 0x8}}, {0x5, 0xfffffffffffffc6d, 0x6, 0x401, ':@%\x99!%'}}, {{0x1, 0x0, 0x800, 0x1400000000000000, 0x2, 0x4, {0x0, 0x81, 0x7fff, 0x0, 0x7d750299, 0x10e3, 0xd417, 0x1, 0xe743, 0xa000, 0x8001, 0x0, 0x0, 0x10001, 0x5}}, {0x4, 0x5, 0x2, 0x8c, '^:'}}, {{0x1, 0x0, 0x1, 0x9, 0x778, 0x49b, {0x2, 0x9, 0x100000000, 0xff, 0x4, 0xfffffffffffffc01, 0x7, 0x2, 0x3, 0xa000, 0x8, 0x0, 0xee00, 0xd97, 0x241}}, {0x0, 0x7ff, 0x1, 0x9f6c, '%'}}, {{0x3, 0x3, 0xc16, 0x4, 0x5, 0x2, {0x6, 0x7, 0x1f, 0x7ff, 0x80000001, 0xfffffffeffffffff, 0x0, 0x400, 0x0, 0xa000, 0x8001, 0x0, r4, 0x1000, 0x5}}, {0x1, 0x5, 0x1, 0x7, '&'}}, {{0x5, 0x0, 0x9, 0x0, 0xff, 0xfffffffa, {0x2, 0x80000001, 0x7, 0x10001, 0xffffffff, 0x7fff, 0x4, 0xa3a6, 0x1ff, 0xc000, 0x800, r6, r9, 0x9, 0x8}}, {0x4, 0x2, 0xb, 0x3f, '/proc/keys\x00'}}, {{0x6, 0x3, 0x2, 0xfffffffffffffffa, 0x7, 0x80000001, {0x0, 0x6, 0xff, 0x401, 0x2, 0x8001, 0x1f, 0x101, 0x6, 0x6000, 0x8, r10, r11, 0xffff0000, 0x9}}, {0x4, 0xffffffff, 0x1, 0xfffffffe, '#'}}]}, &(0x7f0000003040)={0xa0, 0xffffffffffffffda, 0x0, {{0x2, 0x0, 0x5, 0xfffffffffffffffd, 0x401, 0x200, {0x0, 0x200, 0x81, 0x9, 0x8001, 0x3, 0x5, 0x7, 0x2, 0x8000, 0x8, r13, r2, 0x8001, 0x6}}, {0x0, 0xd}}}, &(0x7f0000003100)={0x20, 0x0, 0x8, {0x6f67834b, 0x4, 0xffffff92, 0x4}}}) [ 1800.419153] EXT4-fs (loop5): can't allocate mem for a buddy group [ 1800.434878] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1800.437855] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1800.445343] EXT4-fs (loop5): mount failed 08:57:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 08:57:29 executing program 5 (fault-call:0 fault-nth:96): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000001800)=ANY=[]) [ 1800.487251] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1800.508989] EXT4-fs (loop3): mount failed 08:57:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200246, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000001800)=ANY=[]) 08:57:29 executing program 0: socket(0x8, 0x1, 0x6) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) mmap$snddsp_control(&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x0, 0x4000010, r1, 0x83000000) [ 1800.687194] FAULT_INJECTION: forcing a failure. [ 1800.687194] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.725388] CPU: 1 PID: 29456 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1800.733318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1800.742686] Call Trace: [ 1800.745292] dump_stack+0x1fc/0x2ef [ 1800.748927] should_fail.cold+0xa/0xf [ 1800.752768] ? setup_fault_attr+0x200/0x200 [ 1800.757089] ? lock_acquire+0x170/0x3c0 [ 1800.761074] __should_failslab+0x115/0x180 [ 1800.765326] should_failslab+0x5/0x10 [ 1800.769132] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1800.774253] __kmalloc_node+0x38/0x70 [ 1800.778061] kvmalloc_node+0x61/0xf0 [ 1800.781779] ext4_alloc_flex_bg_array+0x1b8/0x620 [ 1800.786626] ext4_fill_super+0x91ce/0xc7f0 [ 1800.790896] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1800.796003] ? snprintf+0xbb/0xf0 [ 1800.799455] ? vsprintf+0x30/0x30 [ 1800.802915] ? wait_for_completion_io+0x10/0x10 [ 1800.807595] ? set_blocksize+0x163/0x3f0 [ 1800.811678] mount_bdev+0x2fc/0x3b0 [ 1800.815323] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1800.820524] mount_fs+0xa3/0x310 [ 1800.823900] vfs_kern_mount.part.0+0x68/0x470 [ 1800.828407] do_mount+0x113c/0x2f10 [ 1800.832043] ? cmp_ex_sort+0xc0/0xc0 [ 1800.835774] ? __do_page_fault+0x180/0xd60 [ 1800.840018] ? copy_mount_string+0x40/0x40 [ 1800.844265] ? memset+0x20/0x40 [ 1800.847548] ? copy_mount_options+0x26f/0x380 [ 1800.852048] ksys_mount+0xcf/0x130 [ 1800.855601] __x64_sys_mount+0xba/0x150 [ 1800.859578] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1800.864165] do_syscall_64+0xf9/0x620 [ 1800.867975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1800.873178] RIP: 0033:0x467afa [ 1800.876497] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.895402] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1800.903121] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1800.910398] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1800.917675] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1800.924944] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1800.932229] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1800.968341] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1801.039664] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1801.059860] EXT4-fs (loop3): mount failed [ 1801.067242] EXT4-fs (loop5): not enough memory for 1 flex groups [ 1801.079623] EXT4-fs (loop5): unable to initialize flex_bg meta info! [ 1801.086913] EXT4-fs (loop5): mount failed [ 1801.103428] kasan: CONFIG_KASAN_INLINE enabled [ 1801.108526] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1801.120450] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1801.126856] CPU: 0 PID: 29456 Comm: syz-executor.5 Not tainted 4.19.197-syzkaller #0 [ 1801.135007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1801.145069] RIP: 0010:mount_fs+0xe0/0x310 [ 1801.149221] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 69 fb be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 1801.168149] RSP: 0018:ffff88823103fce0 EFLAGS: 00010202 [ 1801.173605] RAX: dffffc0000000000 RBX: ffffffff8a0a90c0 RCX: ffffc90010681000 [ 1801.180880] RDX: 0000000000000019 RSI: ffffffff81a38487 RDI: 00000000000000c8 [ 1801.183268] EXT4-fs error (device loop3): ext4_quota_enable:5838: comm syz-executor.3: Bad quota inode # 3 [ 1801.188167] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 1801.188174] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1801.188182] R13: ffff8880b1400a40 R14: 0000000000000000 R15: ffff888232f1f000 [ 1801.188193] FS: 00007fab52536700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1801.188199] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1801.188211] CR2: 00007f1aeb7b49a7 CR3: 0000000232ef2000 CR4: 00000000001426f0 [ 1801.198636] EXT4-fs warning (device loop3): ext4_enable_quotas:5875: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1801.205354] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1801.205361] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1801.205366] Call Trace: [ 1801.205390] vfs_kern_mount.part.0+0x68/0x470 [ 1801.205405] do_mount+0x113c/0x2f10 [ 1801.205419] ? cmp_ex_sort+0xc0/0xc0 [ 1801.205434] ? __do_page_fault+0x180/0xd60 [ 1801.205448] ? copy_mount_string+0x40/0x40 [ 1801.205465] ? memset+0x20/0x40 [ 1801.205478] ? copy_mount_options+0x26f/0x380 [ 1801.205493] ksys_mount+0xcf/0x130 [ 1801.205508] __x64_sys_mount+0xba/0x150 [ 1801.205523] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1801.205536] do_syscall_64+0xf9/0x620 [ 1801.205552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1801.205562] RIP: 0033:0x467afa [ 1801.205576] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.205582] RSP: 002b:00007fab52535fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1801.205595] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1801.205603] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fab52536000 [ 1801.205610] RBP: 00007fab52536040 R08: 00007fab52536040 R09: 0000000020000000 [ 1801.205618] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1801.205625] R13: 0000000020000100 R14: 00007fab52536000 R15: 0000000020001800 [ 1801.205636] Modules linked in: [ 1801.224124] ---[ end trace 644955e11cc045dd ]--- [ 1801.242207] EXT4-fs (loop3): mount failed [ 1801.266019] RIP: 0010:mount_fs+0xe0/0x310 [ 1801.406272] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 69 fb be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 1801.430415] RSP: 0018:ffff88823103fce0 EFLAGS: 00010202 [ 1801.435799] RAX: dffffc0000000000 RBX: ffffffff8a0a90c0 RCX: ffffc90010681000 [ 1801.443159] RDX: 0000000000000019 RSI: ffffffff81a38487 RDI: 00000000000000c8 [ 1801.450529] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 1801.458263] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1801.466035] R13: ffff8880b1400a40 R14: 0000000000000000 R15: ffff888232f1f000 [ 1801.473787] FS: 00007fab52536700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1801.482692] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1801.488676] CR2: 00007f9848df3000 CR3: 0000000232ef2000 CR4: 00000000001426f0 [ 1801.501472] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1801.509408] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1801.517204] Kernel panic - not syncing: Fatal exception [ 1801.524165] Kernel Offset: disabled [ 1801.527872] Rebooting in 86400 seconds..