0x0, 0x0, 0x4008051}, 0x24000084) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) shutdown(r3, 0x0) 21:04:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/119, 0x77, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 21:04:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x40}}, 0x0) [ 956.443518] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 956.476455] EXT4-fs (loop0): get root inode failed [ 956.517796] EXT4-fs (loop0): mount failed 21:04:13 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0, 0x11137}, 0x78) 21:04:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/139, 0x8b, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:13 executing program 1: 21:04:14 executing program 3: [ 956.696403] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 956.728964] EXT4-fs (loop0): get root inode failed [ 956.741564] EXT4-fs (loop0): mount failed 21:04:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:16 executing program 1: 21:04:16 executing program 5: 21:04:16 executing program 3: 21:04:16 executing program 2: 21:04:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/139, 0x8b, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:16 executing program 3: 21:04:16 executing program 5: 21:04:16 executing program 5: [ 959.496835] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid 21:04:16 executing program 1: [ 959.538847] EXT4-fs (loop0): get root inode failed 21:04:16 executing program 3: 21:04:16 executing program 5: [ 959.572078] EXT4-fs (loop0): mount failed 21:04:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:19 executing program 1: 21:04:19 executing program 3: 21:04:19 executing program 2: 21:04:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/139, 0x8b, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:19 executing program 5: 21:04:19 executing program 3: 21:04:19 executing program 1: 21:04:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8901, &(0x7f0000000040)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}) 21:04:20 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, 0x0, 0x0) 21:04:20 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) [ 962.592958] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 962.625283] EXT4-fs (loop0): get root inode failed [ 962.630382] EXT4-fs (loop0): mount failed 21:04:20 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x20c000000000000, 0x2) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000140)) 21:04:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:22 executing program 5: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000440)) 21:04:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/149, 0x95, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:22 executing program 1: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_usbip_server_init(0x0) 21:04:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x2, {{0x2, 0x0, @local}}}, 0x88) 21:04:22 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) 21:04:22 executing program 3: syz_mount_image$romfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001240)=[{&(0x7f0000000140)="3f636a244b8aa73a3ac5add86e2da922653fa61e07f8619fcc621e557d225adda21e68f514401d3ef94ee37470118ecb63df1d8d00d22ac40da5cb0929025227ba3ffa4de558980c275052b2b3aa07caf97a1f23f5bb14b86d329321db30da03275bd1c35b40a6e56e74d8f4284286b3897d7bb2c3e27479f1bd4fa71db67e0d8aaa5600909a006282a52e87e8d02fc925f637d3de556570ee5d761ac78d685f6a93562de21484c087ba318750ed96ff098d99582144aa1b6a3308d973d9aead5be150f9f5491e9b02b7d7323f2d682cb6ad537053de34f887d2ebb94ae5c945fa15ab43942bfd9740d156b3c71dccd7de778340bc16e8987936900390d40eb74201e47bdf228e1f5aac3d8114af6f00525e835355c98e39c6a806b8352853cc8a3421fb39d5b10983bb2e130b8abab05d8b0ee71ca52ca4517ec85d96fe8d07bd885416737b4f95d134ee7493a5445e95fbe24935009ba36ab30633fc44a4621a82578bfbb7c5cb48554921f0487e7384b394260629afe0251d6770f1266821781b4af49f10761449ab65ac3a71b308669a36d575de058c35177e590a4c77eb2de0c8c046df6e592581a45d3ecf66ada36a1441a8bf69ca520898fba4680c71d1823a26f7919587ad38cd62a38f470ee33d0481ffdaabaf374b734c65eb06881091a66649137a871582520431443262794f302fb1c48d8ba210dab7bad6e188f0dfe885a164b327b3721465eb26e6765f263b5da57613816e8844ad379ca8358ffe45566667f1da7765f8fc73311b0f6b300e0d1452824c70160bbc08c264b6a693c09564d830e3bd484cc16c74db7933f66094e136078d3899cba7b1783083c100202dd3dd3bd569178c7560a56709a1c1a05f835d56922d66abc6434b252191eda9a9672468a92e0892d8817ff1cc0196a94ac7cad484b915b48fae8d986d4760e71b2d0deb2cdc87ca3204121770664d04bd7b5a97dc8cb9a37f8d18d38d08752e6f814fa4d73f2bfcc03d2a1c95ee4c35fd096b0a8644fddfeb19219cd1b9393d951c003c2d5465d25c1c94b42b7f476484bbae8468e48b9c199199a39cf6d07c134336841545d3972aa450d6eb168a3809ca4c7f1e5abb4b873e9ad34157b01f31a7c412163946bb83da9fc85ee2e26f98359a6079ac621f43e23d7716251773a23811eac21dc6cad2dad599422e29d47cac4c70aa1a4e4bdd967b2c1d7b177240b670556139761be056217982e1445375f76216017e70d0c19db472f13ec2bcda353566da4e5c79b651fefb82ada0d5c64e93c8ba27f76629d60f86ae5455ac1cc61660a6b8a8894834f3eb2e6929aa1d1cc8b156dfe3bac676a87531f3bed8ff754025e031d5da93c80c8b58419d9b3499312fcaf5a79beee7a54c95b13841d50d7f805432aaa91a5ccc29036cef0fb274218c7245d2bfdda99480e20c4807ab642a08a9ea88e9dae9f84647060a1125d2ac01d71eddce3b93b0c1a76d50b02f9a5fd42d56271def1685a9b77e5c311f0b52734961ac93216ee127d8f08848b8acb02175fbff66508714a0f16555462567c69d8cd3f87d84a9bb5e8a2216af76e05f74231c2eb337037cf18b44b77517b6caf1c4ea7d23527cff560880269bbadde93c8e67776c43f3b9c3dd224dcfd02cb782d6f159198278b5b5a1166d35399e7e77850274b9d29eb189baa5b4e98e52cda3983f83503bc06476ad2e89577efa589e1a6d6c581b6cdeb217f2931d5c5cccd35346dc9c1edeee2e1d45ea46035801db5ed3887f1d6dd8724d2b5a83089fe1043a6ae73957a8f53a7064540b3cc0604d69f90f04c3efc005e62f11068306fb0694628e0877f3bc854fbc357a9375768440021b9e0b66af46b0f4a34dba9ba5e6182a36133710b35762f0bcf14e1f487fc8af3408b0b6230da720540d0466301806009718f8ea2bb096c1e2688a5cecdce2606a2221d47fa674145a1f79c2607dcedf68b5f1d2d6be483b63e81ddcc9e02b0aa501fef1445d38eaefbfd1543d62e8f086ba4e816ad0e9f495f008e2177aa09cbb2cf35711f8e3cbeaeae2860f2991d44e514f4dcacf04d217f4a0fea82edd0e5a64a75c3ae758f182fe4ee011591c8a3d2ef6cfdecff1daae6d5391c3a721b0c092ee1cda70dbbe1ab1959621bb025539b2562cf487c6a3d8764a1fff87bce2f42f6e4a9323a39a0f71270572b62d4cb3d57b6c64f2f8a407107bc42cdb376a3d22d0847f14c7ed586913c4a5417ae79e0985b1b345f7e836785b391cf918c3d3506f033ab7c351ff6f666facbac49b6e11b14436051aef2800712e6fda038fe97202f03172b7a1d3083a365dc4fac02fa6b5d2962714c5c58abad9968ed4f6fc57cc777b8d3ca56d83f36f501342d79ec670e0191d4dc133a76b8176b25de856d64163215c363e3bbb57cf7fa34e981a40d5afb59b1bf97b61ca42fa3245c0878555cc3f5613bb482fab6af06c195b32ace0a6b342677f8d3cdb371c9fc093f78121b093bcf23eaa7f9a0b1399987ac9420ba4d17c8748f3544f140ea6bd770e0b5007b6af2c7b8d66c917c298c740322ff0d3c141512df18d6c7fa48c2499a5ce42591e7be48cc2636d47977f2214075b00beb29d5ab2335bc2149f03140267bb775e230170516c3f183d3e566400fc2bf8653eaa1c175d3c2fc6bd15b3d39f3200724a1d352bf5ab066d35033c91976166be76802eec1b667eb1bb9ec7155f3a0d6518461cb8137f265fbfafb80a0933687fcede7ef996bba23cef19c276e04e7c93edc03ea2ce370e9c997db3f5004ec16c13b81d19a7c51844ab6104b8ba3b1455552ab07519f5242bbfc811ae7579572c8a889177a4650c754a1b77be5c309e2503ec2d573f5e91199a0590474e46028c807cb1872eb262b185b33654a7bd9a1c9cb4477232d6da5f3da07b0bc95e591ad6bb8144702d657246a0a621a4d98c2aba1a32d42b3f6d7dd9c11761c89b9e20290f5693f915f530eeb830e3a7f577db2f8d5b7563c8f2e3cfa2594db4bde86ce5eaa448c8b65e17c4fa39582f6b768c88e2452b898442a17dea6267a91b9e656443c23d3c716f33496d6e7ab468e5e5d33d6d87562f2b24f23586651fe4ecc0ab0f2f52306eb94259d8728c5a7937a23792307e68fd2b4ff7b3b430879293b39907b066a340667d769d0c9d68033ff2dfcb59f021e2fc7608a622335f700eab7c6aef7500d3cebbb994be0e0542f0d3bac72dfffa98d55c888cf31685cd10b74251ad60feaadf08cbf7ede61e90a923e8b6bbec438582e155d34b50947c6d4fb8b8aec3d3fd18d491826002911e2a9970ea77ca731c9855de5ffbd9ce8580406d229ac01107778a1d9a550ee3e94b31dc1b4e0013932008ca8733fa25b2994957b7d64ec9b3dc008a8d1a685904c49f1b116532af92ce21af8c3b6c881f3e38cdda0f36b8f504e62ea1840736eb75bde148cf84a0a9b807b26b8176d5b42697822defa1e21843cb280638ed21964210c11b619b9248abf798bdd86fb853de764d53aa8dbb98c4e865ab8754628704ded1cf33a611aaad9b81b32fa3fecec2b5720db77457a093b714cfbc816e6cd626f1982202f526338e6a729ec7426ec2bfb138c0c4bb9dd4c4754a03d3640261fe7880f47c970d4779857fedee35dffdbddb05cf63b15bca2e43598c068ca9d1c279682dc7b8f729d79ca331d67be94ab52102611b2f7f91e371561e580a6caa842c9a79d91ea3201190ade1a354e575ccad8da37cb27545a6bb01dbdbb7c0ce36fd9f290824a31219a00598e3c6b31e9b5a9d56d660140415c156addf461449f85300ae3b762673dea845024ca3d40c9ecd37dcc99a96daa7c0e34e286b4d8f5625dda3536ad4fc136d8154ecab0a0227fa66642952f06070f2d21508da2fdf6659927f3312fd3a41d3c712316f01ed6821930c6f1781ddf608ef2de30be3b395f2e0950ea382c486ed9a35db665b2d813621eb5371ae688c67ddfff9417a10f951e1b728c1e7eccc782a7b8a66f8b5fa0629e797bcfd8abe16911c55f274d1dc8835f6f145add1d2d5658dec779b544d2d69de2d9b87b2e26c5bb237186cbc047c4f025bb304dc1a70646da4251b24ecd5d9fa7884fdabec097e94ff33fe095d82687ae70235569a7a07527057240f87eeac62fd063c78a49c00082a01f04c8f86d267c9f2f86ae375bc2f7c64c654b61bedc0c042eeb09079fd54e636ee05e9ba1b37ef5dbb9ea52ff4dd74db0596e70dfb2c6c0646d587a087e9adf170a91d39609913bc201210fc2d3e9d271867ad4069c9372817e468e258cf491de4beceb1f118ad18d0898f628a660398327b35c3e2817727e74dec8d25885671a86bef9d97bc7d9c1da6014a404cb74c1ff15d4cfc6e72c186d05177007ede126ad687ca39cff84169980c7146351a23b42944ea40aa4d91d965e6a291e7fc594dc246e64f6cd354ce161d550a22f4a5da2b6e3d3c13bdf888c952647338d1a686199c6dc9559286cb76316bf66cc9de30bbe56352cb2b43cc639af4070dde1929e789f01c731bf42f141548ced684134ca66e91e7ed974983dbdb3a93143ae80f4a815194c7de636300413e5aa1a9cbacbbb3765e97ea65a2615aa70acf9535aa3c9386370451101960758c396bb061100c04bb9036f928c036d366aa0d84b27111bbadefa4405e9bf58daee5a5721e29838b068ebab243f3774973b1b2d1502889a0136635ec4c24fbba6ee112336174d0665502c10f6efc8e98d45f4827e72b854af0cc2f8070fbc7a3198a31eddfffd3f71ad6a8e67a1e60a1fc9f2a41fed7491b247f4e4ecf565f5281d76c4d5786cff867d1a3de82bd5b7dfa5403636fb5d37d4ff465d5a5e454417ce0fd9ec95c811fc55461129010898dc3884b5e3eb00d431a5a4411d9149f380081f3847a6e7715f3ce4a0ea2a7128170fa05eff0d05022bd9343a19b269d4b40a73839550cfb205a4c0d4bdc0e5009bfd35ad4a7d5093d1cf145991fbb3cdc61f97b26ba45312a3fe9340a8e88bdfd7695646ca1ae9f92d6225929f192a3ab909626724b07282ca96eafe72e0f2c6e8a03cbdb6124123da63d7e176de199a73d50268ed7e60f979b3fd33c3321ab9c42578f03a40b920ac6ee167e2f800d8bc612fd703f4fd8c6b4b90358985564aafce8d34ed29dce85e83283c1b603aec32b62a2c2747a0d0dfea6f776351d42ec78092edef6c2756d90244e3ffb29bfa5bd470c4f8360132079be67265b7536cb41fbbf0f099fe34b58944da27c281cfbd3f8a36f1367f4f784c4a7d6ea3efb41cae77d4dd23cb55d655fa29eddb8c5678b92efaac91c3e8d5fd0513b2a647902be7879dec06ea969eab0de93175240bc002c9c390562ba6d90e81c8866835631e46fd8954fa1cf2147b304293aa29d05cc4d1977b8471c3079c4baa3accd6edd3fa4d00f81958879c1704d124b2e506bc92bac97881cd7899c3e28e3bacf3c40b20ce55b38137a96cea090e355949737d5ad07f013b0104d9afde83e3e66537435d397b0e1510a86b659fa62f38de2128fa15bf2785529d413a3e5c6b42e4d2174de33f3ebfd1a20733392439a30d8b0ce8a3d8f52c628cb6f5233bc3c8ac29305066ef37b09ab03eca83fd7212319505572e99e0edc97fd21017bc8c1dcca189bfd3aa2475c831876d313772c4a917c183734d4d3a2341d2f083e255b3836bfbc8ff65e5f9c998d81c4a6f6207fa6f6e3bc17423b428e6ebe4bc26ea4a1df03444c8bdae912a6d5c7d4f9f69d05bc56b2d8f45203c7b7c2ef91c2", 0x1000}], 0x90c020, &(0x7f0000001280)={[{'vxcan1\x00'}, {'\\\'\n%'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'/+'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x61, 0x61, 0x37, 0x34, 0x33, 0x63, 0x63], 0x2d, [0x37, 0x52, 0x38, 0x66], 0x2d, [0xde3fcbdba8ed1633, 0x33, 0x38, 0x94a0a857a3a5e76b], 0x2d, [0x60, 0x38, 0x34, 0x33], 0x2d, [0x39, 0x38, 0x31, 0x63, 0x39, 0x62, 0x66, 0x62]}}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, '\\-,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_eq={'euid'}}, {@subj_role={'subj_role', 0x3d, '@'}}, {@smackfsfloor={'smackfsfloor'}}]}) [ 965.581209] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 21:04:23 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000002f40)='/dev/nvram\x00', 0x101002, 0x0) 21:04:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a0, &(0x7f0000000040)={@remote}) [ 965.628492] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 965.647010] EXT4-fs (loop0): get root inode failed [ 965.655060] EXT4-fs (loop0): mount failed 21:04:23 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0xea60}) 21:04:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/149, 0x95, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:23 executing program 3: ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xb929, 0x4300) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x140e, 0x0, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x1}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x24008004}, 0x10) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000140)={0x0, "1ecc37"}, 0x6) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x3) [ 965.808671] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 965.851813] EXT4-fs (loop0): get root inode failed [ 965.857819] EXT4-fs (loop0): mount failed 21:04:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:25 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc0205648, &(0x7f0000000040)) 21:04:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40002021) 21:04:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000005c0)={0x0, @hci, @xdp, @tipc=@name={0x1e, 0x2, 0x0, {{}, 0x4}}}) 21:04:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/149, 0x95, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x5}, 0x40) 21:04:26 executing program 3: syz_mount_image$romfs(&(0x7f0000000040)='romfs\x00', 0x0, 0x0, 0x2, &(0x7f0000001740)=[{&(0x7f00000000c0)="3ff14275044a8edf2139365a6eaf1ec3f69c092b9b07479a26ccd3a59cbc7392132a98592b21d886fc9189e55929c348a3191ae60b8d8436cd68fa527bde9d056e4aa1fe76c5a438047b2a0a7cf731781a819ebbfee841e8b287f6b5c72cf27d086b76b3d76da3f9fb276b99f29180e784fd35dfb0f1c42c23658ae660fb84003058310938df3b32ac94c06ab8d7b3272cdd9f9e7a0c79142bd0a9a1f6cd1d951de870bccfebd2f12c6ec388340aa6b99767cec97932b044339fb7f9f65dc9b534fc746b208880be0694f52c024df33c5989ec59190e93e01aa337aab87ef950d5abdf6c096daf2daf07a6fe2f9e67086a83bb0ae16b42881733133eb54d126caf4300a53fc8db9cb3148fcd91210c469c7c7e792374e263541d8d72ad2998989e41cdc5083da44bca18c45e99aaa544880ba03bf84e36b71419fac45b28d9371e0e44b185c355288d62f597c9344d00c177282be8720942b7be6c804645838206c67e3734fc9e4222a9a7e078178735c3fa6dbbd815c56a880196c77bba17ee9c53ab07369452675e52711b41fd9ca3446f2cdbfb134c14b5e4f0ab60a5776bc00023e2b112d956a85048f85ee4fa4ff4376338239a0b96c806318a3baca5b0464a9af19f0a48ee46699e3d2a745ea4fb929162b75da012dd623c27960a755f8caea191b999adefaaa300ccfc5c21a98fe27033b6d66d87e1e76aacd02ff006290aaab5da9f21f7e95c27da896e864047b40298a315559931db2202617e63aae320f6401a5298af81c40ec55b199d73d6d5d58ddde17b29fd1ec96eb87ced93cb38f8e2723c228bbbfeeb3dde649d3a5aa086b0f39c3c9f0d577c6c1896c18cf104ed2d7677512a7cee18da2f64087a1e10f1193e7b96c50ff54f439decaa9a605c5499ddb19bc1fc11e6f0f13f02bb08b63ab794baca20d059a4edfadf030beee56da3a1a04c5190dfee6da3921e91ed5fbb21cbf3fa8cdd9e061024506202bb6aeb3ba6c79306bd349f231bbc9429ae7b2a4be264366c53d04ffe38af758efc2c9bca41f2904ca69dcdf5fe4a31a13c2b4c1c9e32aed9bf5344f69a19f13e92009e401f89c89af6a56f9eb677e9876ef7d424e88ae45597a0551e375324bb3cbb20222124d35c2d2608245055babd34cf7a104fae33b352b86fc643546a731eb642dffb8d0f2a30a31df90c208458168642da4eb4c53abfce3da08af0d14d7d5a45c678cf39f0b49d240d8d25dc5e08707d10a159dba6480961c603c7fda6bbebd5fa57e2c761ded453e8ee423132a600974ce71369b0dbf6d64118cb7621ca4d67c07beae35882c5f06e2147e0c58216115615aae3040ffc5f35b2261425586c96ef1e6a361c35847f7f28ab8526fd2925c4516b321c0753fb1bde32aa307d5a8260df35cc95bec5ec91fcd552b9fd290897dd8e07453097482e9b75b6f2a25f0efe2e7889562a084ca2db9468e576f639c2da2a1f91a02830ab4b5c272fd208e9742f31782bbe35dd809296f7204dce1ed77fc136b0be6a4e9e2fc5b4476cd66034a9fc9ddd5652846b2365fefa558feaf8b56815f1129b50ee28fd26ae63c13c1c796facae96e6a8c60f113019027ff3e9dbce686bcbd69f868cf1d0c07fffb1986339085c6a56cfbcdfa13ad37c9178b3dbd20cc47fa7420c65dcd5fc6a9fe309890a9e24afc634b4a6b505d1c250fd5b5cb88af0afff310905e3d3d2ca6f4387ce67d55ff228d68e99baa032354a86d46bb52f451285c81c6bd246e68251c20275ec2d2e2eee44ed5ae1eeb3e6b811171aaa569dee63b2e77100e0409f6bcca9372adf97241f04ebc0b907a4515d81d9f1290466f4301970f33e9724506132df8a6e31ddc5404b4b67df85d6abfc54cbd9659eccfc0e3316300824f44ce89860ca100ddc4e8b604ce86167f072b8f2ff6657d55d319b491e8415a490faf4cf09817e030b9681390765118494a537e525a75dc4434fec05e01a34cc6dd522a2140daf2a9692d3fbf0db46ae048ffa0f004696ed5a14da1d13114a14598abe717340eafd3c689da04f2de934eb83ad7931be4e455df2ec67bfa47703822c0716752a96a83e8ed40cbf2fe242db424880e4e0a90d1d6953efda5696615c1d0a44ddb733160d19666db65e9c05ece61a9daa16de9d0925042f5cb8d103b8004e788d02fe02d862dfd2d42e52c66357b0c2e2531a2eef938454b612d4df5f10e74d9f4327463aea74af421c7964944e7525834bbc8b3831c15b2a7e120f03302e5c3301a5fb5d92e89f30eb83c1221d558076efd1553d7397b9fbc29f54094f80b72177efae00667e3e24b3edfa1b8734b7aa33a10fa333c72d85638d41579d8fab1457208883792d6c987611541a3bf3fa21d5445fe801e0722ab6908e1adaf02eb9fce47344ac994541790f4469e874b727dc55db0fd7b88cc94c539797adc0c9f2a16bfddb449bb377d0d59005021ff1f244930273142e5b98b0ffa2c1dbf3e0e31ee80678743810cf7b906added96bd1fb0c4f796b55c72d2933499708bca2326b5b4034cd059b8d512bda2c508fda9d5458cefb2d794e9d7b7022490d29a389049297a20186a13ed71b20614a997bcb954736d58bfb3901b15635fe7e511789b6f78ebb92675aeb50b6cc5f6bb424577dd5742e9c144cf1130ccc4618eeafeb8a0ce697a5c78837ab5c943a567d15aa84a7c56a3307fee31634a124a7db9134119647ed4e37f129564e963ec53f15a847af5ec8491ac439ca09b05a102d453c432e320ae74612c5b8c1e8000d3cdef9510d241a5e0f5b8c9561da03e5eb87d39a5df60729111c0f2dad1e83dce92e6715066ae4cc84a7ccdab9d426528a534fea16e2a94470f1e37df5f0331bbeaf327790c421b52924c22198feaf59c5f09fe0aad00603356ab9fbcc71f1d1d04fce175fa12f53937195d4d1540cecd1f73d46bedcb7d86e45318b9f9de66d8537f193a5746e37407446984d20f241eee7474ec6a8186be2d6aefb71a4f460183bb8f7a0d8110bd56d166860f24c54534cf4876e030a5c89318fe63f62f1b1250cd52d2cfbefdfeb12e954e9429548db5709dcf90b74117e0c10babc7df60c0a33c5ffea49daf953fa990a874ed941ab0255c2a75527e6d31dd2f2062bd23f6834b4396872194452e5deefae027d0818aee6684bfd2a8231e1a6bb7503927731563b1dab4839439be96237f1c2886cc7aa73d91d9e9277a34e2f3dfffb87e5922c70a4201572b74b93ad4c76d7ade21eaa3f00bed50efb497d3c5315df9d36a5486e653e6bcd819bf1ff8f3545fccdee7f79d4c73d55791edafea32dd1b43eebe11b7686d61dfabe27d04175bbbb95ab9369e0240cfbb1b85d6bffaefb0fcbadc0e2538e40036e23100fd23518bdb1025aa70447d59526a762be32429d42dc3ee0914d56592073ab26ad000878702b64ae1167b4cf0d667129e9f4855a8d3eb4a6ec5103ce977f4a8fbd66e0aafc571393eacd7e95dc42444f5b5fc6d6aa8d6602802b36d5f13c33d420dfbe4c34b0ef53beb12ff017e0cc8a813b83d858fa1db3338e3db62032812507db6c99bb6e087577c16598967134c54fb0de3087c7727ff22337e5e7bd4bed1838ee5a0bb53ade7f9ed63afcc8da114c6f2476e4dab107fb4c34d9230e46c6129e3d29c578ce88d2bc6b4594dead9b1fac9db922e5fc4584704fbc09ea10dbb5a88754344e823bdb2259202a8efc9195d641b8c77a44ee0afaa455b224d68a7ef4fe5e44d5cc4da18d23944348d8ed0bdc5436ea9e00c06206a5673938983d379f965f7a14c36c37501a0e219ec8eca23cadeee5f5536641b6ec23065ddac7c2372577ac7c160bf5a2f91c3a7a45e98b3f1be50b0482cc8b9b959fa1b1af5ab7bc42133b0dda5a99ee3e41327a6dc3ca6042bffd59cdb480ebbd0fc002f3b5ef7a7e1911345127803c99a1c79e3ea1dfb4595295c591de65521b3081fa6bddcfc6ffa78232c9c84299785fdcbadb1edf1e54c09973e9ef07d800ff8f5fbea900ea61a18efd89977047396f5b64ffed7187a1cf90f6def9968e04949930c81fd3116f2615fa80702ea20ee233ad283019a5a40f49d66af2d00b47dbe76612a9ee0cbdefaad61473eeb9dfb3410b9202dd94c49b84fa1e2aa2dff8f125ef4ad86c41124104c90d7aa539340ae0480386d055715a8e65f5eed2be362808efb6992e27e859849188bd4665c3d7e4ceab36c7612225434a3cf85f83f30c8a6d8a55cbb047c9a61d6f39d0c3613ab659146d9cfa4994ef79fe6ba7e0475ec4dda11ad3c2e8b2db6207df2c35baba76413cedba64c50b57d5db3d78940b2111022dfc08c06f45a9b9697c9be3f7f782d639b72d96adaa34e83549f3897f699c009efbfe9d6a998178c798a027d828d05bda3fd484b2caab9ca0cd25adfd6991dc99f7c8de115d2da96c46cafc16ab15cdf617c0a151f6ed987a72935687e69f7f8a4068f7ffafb474a4da81b6363494b1776f09028392ca6bee0fc0138302b197c1a4911abe8a044372e0e71e258ddfc38a6a8509fa4537011e91faf4f53de4f123b93f57b9a5990091d1013bee50a705814c7f7fe0bfc3c97f93b7fabb75fcbb492a3bb5bf76fb0f97de8583183645634a96221ff72267a6edd130863aaa635e864bfd3349c3a9b2d625cbb1ee78ed8dba534771b1ceb83ec849960868b1085108ff14dfdc61876dd1d0e061b0359b66fba92b24a56a5a3c85f5182173a9a92220e1737fa9e8a80f42cf3821caa1e409d4596c414d57f35f3d48745d27a83bc401b9ba52add3fefcb430f9bf4fb4f7d07e69ac1230b722cf77c1a8e63c989571abc5deb048d429a760bd1c1ba654a16a9e696ecdc889239e63acb292a5c584535a78497ab4029044035e470982ee67a185433c32da5f70d34d097efba2bebe97d35d7bf420103fb7713d3409d728eb1d313d6ed356f37c040371dc4907d5c6c9af6f592d5f9b95e84d5e4d87ae0c719ece26bef0414461192a4abe7e744e25803bb6d73460fbfb6521831a64811af276e566a17e8dc839af91b8e3f1e9e758a426e87b3fdb366040fc1ebf59e05d7fa397c06047051fbbb4663154d36e4aa325bcb75962fe4b87b96656c8896c39f2bd9fcdebcd049952966aeabf8f808f7f9514a82c44f428c9fb2e598e3f07ade968a1cc2e8f6df5a9da3a3cc4f4e060b715cc872a0b57da609c4c13a5a0ddbf6edf38c95c8c5a7dcc6ef164368b85426540668d06c9575a01eb3713c48abb86116e833f0d0c355faf3111290c346314caf1a94e215d900808ed2a18058596b88cb4af940eddeb0db8aa3a1483bbf076a8656daa355e830b7820de9528028dac874e28b871dcc019f773e80d71d09a6f9443435f317d8a5587d40a1158e40c4401afeab0b0d179980d0a072c880fa2761c162024ce5b1416d8db70a2e4d25290fcd9e096586befaf0fdfd4b4097adfed08b8ddc3861fbe002f5392ebb46d19b3adfdbbded7509555f2658a96dd0323cf9888f99cf12590be5c38cc26ac9df87e0d39e86c19ee13bc578244c461f6e01ffef267c69c0af0e5638bab1a9e853a7bc7b2bee7bbdf75b216e6815445294a76e19fc0ac490665027d0f3e3986013d794c39a9d2ce54214ab93f23ab60fc32f74a23284d91bae0345c63620ae85be96ae5496b55505204c2c780aec2fe322e3c3a287a8e5457a214b5196756203a1091e146dedc680de7a6a9ebcd9127ddd811ffe1c6722335ef506dfad22f16f4bef20119867f921bdcfb38d4ed790d0b92baebe4f", 0xff9, 0x8}, {&(0x7f0000001280)='4', 0x1, 0xffffffffefff1a1b}], 0x0, &(0x7f0000001840)=ANY=[]) 21:04:26 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x4e20, 0x0, 0x2, 0x80}, {0x0, 0x0, 0x0, 0x40, 0xc23, 0x0, 0x5}, {0x0, 0x8, 0x9, 0x7}, 0x81, 0x6e6bb3, 0x1}, {{@in6=@dev, 0x4d2}, 0x0, @in=@private, 0x3504, 0x0, 0x3, 0x2, 0x0, 0xe0c}}, 0xe8) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 968.652488] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 968.690271] EXT4-fs (loop0): get root inode failed 21:04:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000040)={@remote}) [ 968.712928] EXT4-fs (loop0): mount failed 21:04:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/154, 0x9a, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x404, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4}, 0x40) 21:04:26 executing program 3: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001240)=[{&(0x7f0000000140)="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", 0xec1}], 0x0, 0x0) [ 968.868238] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 968.892426] EXT4-fs (loop0): get root inode failed [ 968.904953] EXT4-fs (loop0): mount failed 21:04:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:29 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002f40)='/dev/nvram\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 21:04:29 executing program 5: syz_open_dev$vim2m(0x0, 0x0, 0x2) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:04:29 executing program 2: syz_mount_image$romfs(&(0x7f00000000c0)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x90c020, &(0x7f0000001280)) 21:04:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1a}, 0x40) 21:04:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/154, 0x9a, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:04:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000040)={@remote}) [ 971.739925] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid 21:04:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000002b00)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, 0x0, 0x0, &(0x7f0000001640)=ANY=[], 0x14c0}, 0x0) [ 971.795451] EXT4-fs (loop0): get root inode failed [ 971.812693] EXT4-fs (loop0): mount failed 21:04:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x0, {{0x2, 0x0, @local}}}, 0x88) 21:04:29 executing program 1: 21:04:29 executing program 3: 21:04:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:32 executing program 5: 21:04:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/154, 0x9a, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:32 executing program 1: 21:04:32 executing program 3: 21:04:32 executing program 2: 21:04:32 executing program 1: 21:04:32 executing program 5: 21:04:32 executing program 3: [ 974.817641] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid 21:04:32 executing program 5: 21:04:32 executing program 1: 21:04:32 executing program 3: [ 974.860714] EXT4-fs (loop0): get root inode failed [ 974.909525] EXT4-fs (loop0): mount failed 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 5: 21:04:35 executing program 1: 21:04:35 executing program 3: 21:04:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/156, 0x9c, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:35 executing program 2: 21:04:35 executing program 1: 21:04:35 executing program 3: 21:04:35 executing program 5: 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 1: 21:04:35 executing program 3: [ 977.873742] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 977.908004] EXT4-fs (loop0): get root inode failed [ 977.936214] EXT4-fs (loop0): mount failed 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/156, 0x9c, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:35 executing program 1: 21:04:35 executing program 5: 21:04:35 executing program 3: 21:04:35 executing program 2: 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 1: 21:04:35 executing program 5: 21:04:35 executing program 3: [ 978.091994] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 978.116621] EXT4-fs (loop0): get root inode failed [ 978.128449] EXT4-fs (loop0): mount failed 21:04:35 executing program 1: 21:04:35 executing program 3: 21:04:35 executing program 5: 21:04:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500"/156, 0x9c, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 5: 21:04:35 executing program 1: [ 978.313797] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 978.338495] EXT4-fs (loop0): get root inode failed [ 978.346070] EXT4-fs (loop0): mount failed 21:04:35 executing program 2: 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 3: 21:04:35 executing program 5: 21:04:35 executing program 1: 21:04:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086", 0x9d, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:35 executing program 5: 21:04:35 executing program 3: 21:04:35 executing program 5: 21:04:35 executing program 1: [ 978.524900] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 978.563016] EXT4-fs (loop0): get root inode failed [ 978.569233] EXT4-fs (loop0): mount failed 21:04:35 executing program 5: 21:04:36 executing program 2: 21:04:36 executing program 3: 21:04:36 executing program 1: 21:04:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086", 0x9d, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:36 executing program 5: 21:04:36 executing program 1: [ 978.815912] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 978.853456] EXT4-fs (loop0): get root inode failed [ 978.858529] EXT4-fs (loop0): mount failed 21:04:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:38 executing program 3: 21:04:38 executing program 5: 21:04:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000000000000000000000010000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086", 0x9d, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:38 executing program 1: 21:04:38 executing program 2: 21:04:38 executing program 1: 21:04:38 executing program 5: 21:04:38 executing program 3: 21:04:39 executing program 2: [ 981.572857] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: checksum invalid [ 981.594395] EXT4-fs (loop0): get root inode failed [ 981.599591] EXT4-fs (loop0): mount failed 21:04:39 executing program 1: 21:04:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e}], 0x0, &(0x7f0000000080)) [ 981.746876] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 981.772624] EXT4-fs (loop0): get root inode failed [ 981.777614] EXT4-fs (loop0): mount failed 21:04:41 executing program 5: 21:04:41 executing program 3: 21:04:41 executing program 1: 21:04:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e}], 0x0, &(0x7f0000000080)) 21:04:42 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) bind$packet(r0, &(0x7f00000000c0), 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 984.614079] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 21:04:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 984.658493] EXT4-fs (loop0): get root inode failed [ 984.665980] EXT4-fs (loop0): mount failed 21:04:42 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e}], 0x0, &(0x7f0000000080)) 21:04:42 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000000c0), 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 984.862308] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 984.886629] EXT4-fs (loop0): get root inode failed [ 984.901444] EXT4-fs (loop0): mount failed 21:04:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 984.909708] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 984.923296] EXT4-fs (loop2): get root inode failed [ 984.928410] EXT4-fs (loop2): mount failed 21:04:42 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 985.036750] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:04:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:44 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 987.633483] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:04:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 987.754031] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 987.876443] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 987.914185] EXT4-fs (loop2): get root inode failed 21:04:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 987.927051] EXT4-fs (loop2): mount failed 21:04:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 988.087418] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 988.223902] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:04:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 988.407066] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 988.605255] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 988.622191] EXT4-fs (loop2): get root inode failed [ 988.627749] EXT4-fs (loop2): mount failed 21:04:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:48 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 990.655469] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 990.874842] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 991.032584] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 991.094054] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 991.114616] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 991.127181] EXT4-fs (loop0): group descriptors corrupted! [ 991.137684] EXT4-fs (loop2): get root inode failed [ 991.146488] EXT4-fs (loop2): mount failed 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 991.333297] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 991.364341] EXT4-fs (loop0): group descriptors corrupted! 21:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 991.494964] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 991.506408] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 991.506918] EXT4-fs (loop2): get root inode failed [ 991.515461] EXT4-fs (loop0): group descriptors corrupted! [ 991.546633] EXT4-fs (loop2): mount failed 21:04:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:51 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 993.733437] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 993.745304] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) 21:04:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 993.794284] EXT4-fs (loop0): group descriptors corrupted! [ 993.854416] EXT4-fs (loop2): get root inode failed 21:04:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 993.982158] EXT4-fs (loop2): mount failed [ 993.995442] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 994.021343] EXT4-fs (loop0): group descriptors corrupted! 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 994.210688] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 994.221188] EXT4-fs (loop0): group descriptors corrupted! 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 994.302701] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 994.312011] EXT4-fs (loop0): group descriptors corrupted! [ 994.384811] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 994.411367] EXT4-fs (loop0): group descriptors corrupted! 21:04:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 994.518156] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 994.527068] EXT4-fs (loop0): group descriptors corrupted! [ 994.596821] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 994.614360] EXT4-fs (loop2): get root inode failed [ 994.620441] EXT4-fs (loop2): mount failed 21:04:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:04:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:54 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 996.738396] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 996.751916] EXT4-fs (loop0): group descriptors corrupted! 21:04:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 996.939533] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 996.961824] EXT4-fs (loop2): get root inode failed [ 997.030712] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 997.044402] EXT4-fs (loop0): group descriptors corrupted! 21:04:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 997.073656] EXT4-fs (loop2): mount failed [ 997.234769] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) 21:04:54 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 997.282104] EXT4-fs (loop0): group descriptors corrupted! 21:04:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 997.350232] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 997.446553] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 997.498479] EXT4-fs (loop0): group descriptors corrupted! [ 997.521052] EXT4-fs (loop2): get root inode failed [ 997.526208] EXT4-fs (loop2): mount failed 21:04:55 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 997.649804] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 997.682166] EXT4-fs (loop2): get root inode failed [ 997.692506] EXT4-fs (loop2): mount failed [ 997.780282] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 997.790593] EXT4-fs (loop0): group descriptors corrupted! 21:04:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 21:04:57 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 999.832176] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 999.849471] EXT4-fs (loop2): get root inode failed [ 999.854639] EXT4-fs (loop2): mount failed 21:04:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:04:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:57 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1000.078578] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 1000.096456] EXT4-fs (loop0): group descriptors corrupted! 21:04:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1000.204283] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1000.226941] EXT4-fs (loop0): group descriptors corrupted! [ 1000.342617] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1000.354595] EXT4-fs (loop0): group descriptors corrupted! 21:04:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:04:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 1000.388000] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1000.404986] EXT4-fs (loop2): get root inode failed [ 1000.411657] EXT4-fs (loop2): mount failed [ 1000.503654] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1000.518371] EXT4-fs (loop0): group descriptors corrupted! 21:04:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1000.627723] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1000.644751] EXT4-fs (loop2): get root inode failed [ 1000.650743] EXT4-fs (loop2): mount failed 21:05:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1002.780736] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1002.799064] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1002.810609] EXT4-fs (loop2): get root inode failed [ 1002.815547] EXT4-fs (loop2): mount failed 21:05:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1003.099558] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1003.124299] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1003.135929] EXT4-fs (loop2): get root inode failed [ 1003.142780] EXT4-fs (loop2): mount failed 21:05:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1003.236064] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1003.341829] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1005.810715] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1005.831662] EXT4-fs (loop2): get root inode failed [ 1005.847136] EXT4-fs (loop2): mount failed 21:05:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1006.102851] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1006.263093] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1006.274281] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1006.288767] EXT4-fs (loop2): get root inode failed [ 1006.293903] EXT4-fs (loop2): mount failed 21:05:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1008.874551] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x21) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1009.149641] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x21) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1009.300054] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1009.310497] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1009.354746] EXT4-fs (loop2): get root inode failed [ 1009.380758] EXT4-fs (loop2): mount failed [ 1009.424490] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x21) r2 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1011.903864] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x21) r2 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) 21:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1012.156545] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x0, 0x21) r3 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6}, {0x8, 0x15, 0x4}}]}, 0x50}}, 0x4008045) sendmmsg$sock(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1012.287467] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1012.304171] EXT4-fs (loop2): get root inode failed [ 1012.310899] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x0, 0x21) r3 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6}, {0x8, 0x15, 0x4}}]}, 0x50}}, 0x4008045) sendto$inet(r3, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) [ 1012.334802] EXT4-fs (loop2): mount failed 21:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x0, 0x21) r3 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6}, {0x8, 0x15, 0x4}}]}, 0x50}}, 0x4008045) sendto$inet(r3, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1012.462551] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1012.622171] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1012.653858] IPVS: ftp: loaded support on port[0] = 21 21:05:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x0, 0x21) r3 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6}, {0x8, 0x15, 0x4}}]}, 0x50}}, 0x4008045) sendto$inet(r3, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:05:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1015.266036] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1015.343851] IPVS: ftp: loaded support on port[0] = 21 21:05:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1015.407593] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1015.421713] EXT4-fs (loop2): get root inode failed [ 1015.479099] EXT4-fs (loop2): mount failed 21:05:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1015.545385] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1015.739906] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1015.851991] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1015.871061] EXT4-fs (loop2): get root inode failed [ 1015.879935] EXT4-fs (loop2): mount failed 21:05:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40040, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = open(0x0, 0x0, 0x21) r3 = socket$inet(0x2, 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6}, {0x8, 0x15, 0x4}}]}, 0x50}}, 0x4008045) sendto$inet(r3, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r3, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba57ae4", 0x47}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}, 0x578}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/247, 0xf7}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/213, 0xd5}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001ac0)=""/247, 0xf7}, {&(0x7f0000001bc0)=""/178, 0xb2}, {&(0x7f0000001c80)=""/229, 0xe5}, {&(0x7f0000001d80)=""/235, 0xeb}], 0x4, &(0x7f0000001ec0)=""/179, 0xb3}}, {{&(0x7f0000001f80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f00000020c0)=""/78, 0x4e}, {&(0x7f0000002140)=""/86, 0x56}], 0x3, &(0x7f0000002200)=""/51, 0x33}}], 0x4, 0x43, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1015.941719] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1016.093526] IPVS: ftp: loaded support on port[0] = 21 21:05:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:15 executing program 5: socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000040)}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0)=0x1, 0x4) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) 21:05:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1018.254161] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1018.458689] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:15 executing program 5: socket(0x10, 0x80002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) [ 1018.636243] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1021.252630] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1021.404869] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) [ 1021.581631] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:21 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) [ 1024.442645] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1024.548128] EXT4-fs (loop0): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:05:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1024.679308] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1024.828040] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:24 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1027.461406] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1027.526000] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) [ 1027.557811] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1027.681328] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) [ 1027.744491] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1027.859534] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1027.867495] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) 21:05:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af30100040000", 0x4f, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:27 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1030.500428] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1030.582141] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) [ 1030.598061] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000080)) 21:05:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1030.716501] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1030.832279] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 1030.898664] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000080)) 21:05:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:30 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}], 0x0, &(0x7f0000000080)) 21:05:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1033.561913] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1033.612731] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1033.624836] EXT4-fs (loop2): get root inode failed [ 1033.640390] EXT4-fs (loop2): mount failed 21:05:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}], 0x0, &(0x7f0000000080)) 21:05:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1033.678434] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1033.796585] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1033.809205] EXT4-fs (loop2): get root inode failed [ 1033.815442] EXT4-fs (loop2): mount failed 21:05:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}], 0x0, &(0x7f0000000080)) [ 1033.862918] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1033.984504] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1034.014674] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1034.027403] EXT4-fs (loop2): get root inode failed [ 1034.033999] EXT4-fs (loop2): mount failed 21:05:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 21:05:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0, 0x0, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:33 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) [ 1036.595971] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1036.703267] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1036.728118] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1036.741126] EXT4-fs (loop2): get root inode failed 21:05:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1036.759444] EXT4-fs (loop2): mount failed 21:05:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1036.807636] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0, 0x0, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1036.919193] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1036.986903] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1037.014136] EXT4-fs (loop2): get root inode failed [ 1037.024206] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1037.045018] EXT4-fs (loop2): mount failed 21:05:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 21:05:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0, 0x0, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:36 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1039.644960] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1039.730086] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1039.742466] EXT4-fs (loop2): get root inode failed [ 1039.747603] EXT4-fs (loop2): mount failed [ 1039.757843] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00), 0x0, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1039.889070] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1040.018418] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1040.044594] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1040.083813] EXT4-fs (loop2): get root inode failed [ 1040.090086] EXT4-fs (loop2): mount failed 21:05:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00), 0x0, 0x9060}], 0x0, &(0x7f0000000080)) [ 1040.215136] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1040.308007] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1040.320212] EXT4-fs (loop2): get root inode failed [ 1040.327465] EXT4-fs (loop2): mount failed 21:05:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 21:05:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00), 0x0, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) [ 1042.641759] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0}) [ 1042.738108] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1042.750231] EXT4-fs (loop2): get root inode failed [ 1042.756044] EXT4-fs (loop2): mount failed 21:05:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1042.886981] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed41000000040000", 0x28, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1042.995768] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1043.084036] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1043.099162] EXT4-fs (loop2): get root inode failed [ 1043.108992] EXT4-fs (loop2): mount failed 21:05:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed41000000040000", 0x28, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f00000001c0)={0x0}) 21:05:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) [ 1045.686650] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1045.809806] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1045.829071] EXT4-fs (loop2): get root inode failed [ 1045.834879] EXT4-fs (loop2): mount failed 21:05:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1045.916966] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:05:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) 21:05:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed41000000040000", 0x28, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1046.091430] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1046.166194] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1046.177940] EXT4-fs (loop2): get root inode failed [ 1046.186701] EXT4-fs (loop2): mount failed 21:05:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) 21:05:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f0000000000000400", 0x3c, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:05:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1048.708038] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1048.899139] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1048.912759] EXT4-fs (loop2): get root inode failed [ 1048.926132] EXT4-fs (loop2): mount failed 21:05:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002c", 0x29, 0x9060}], 0x0, &(0x7f0000000080)) [ 1049.174351] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1049.230200] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1049.242426] EXT4-fs (loop2): get root inode failed [ 1049.247564] EXT4-fs (loop2): mount failed 21:05:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:05:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002c", 0x29, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1051.776765] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 21:05:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1051.886374] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1051.907159] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1051.916134] EXT4-fs (loop2): get root inode failed [ 1051.934348] EXT4-fs (loop2): mount failed 21:05:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 21:05:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:05:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 21:05:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 21:05:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002c", 0x29, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:05:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c2e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56bffcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e702080000005efd90c8c48358f8dbe82e16cf000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffc91a869db7605202f964e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326be6a7905ef7de375ef8bc8143df20d13c37db269971210faa7071e93094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2da0f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbdb957fc1de55580a678c664813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a19ecb713559075b6f0dd1236ce12a86fc60a2d4f658ac161164c52acd01348669305dd52da9668f683134afa2b973aa73a4b9d42fdd6c14d9e6200de42e6b42f2d1ecf20510ece2ae343796f9e95580be2c37945a6b6144cef685a9eeffc44d940d22cf0ef08c972d11b36eba1f6e26e354475c30171ab0ff869d4d04c2dec6a0000007d27c7c7269bed9d643881327ce7a3418215997b97289892e1dd1c9c28516dfa93b82c5e62f7013109dc92c0f84a8c0000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1055.048146] ptrace attach of "/root/syz-executor.1"[6943] was attempted by "/root/syz-executor.1"[6946] 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1055.181099] ptrace attach of "/root/syz-executor.1"[6954] was attempted by "/root/syz-executor.1"[6956] 21:05:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f00000002c0)={[{@fat=@flush='flush'}]}) [ 1055.359717] ptrace attach of "/root/syz-executor.1"[6967] was attempted by "/root/syz-executor.1"[6968] [ 1055.433556] FAT-fs (loop4): bogus number of reserved sectors [ 1055.448158] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1055.542217] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1055.563605] EXT4-fs (loop2): get root inode failed [ 1055.568575] EXT4-fs (loop2): mount failed 21:05:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 4 (fault-call:12 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc464", 0x33, 0x9060}], 0x0, &(0x7f0000000080)) [ 1055.668465] FAULT_INJECTION: forcing a failure. [ 1055.668465] name failslab, interval 1, probability 0, space 0, times 1 [ 1055.683498] CPU: 1 PID: 6995 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1055.691325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.700688] Call Trace: [ 1055.703336] dump_stack+0x1fc/0x2fe [ 1055.707027] should_fail.cold+0xa/0x14 [ 1055.710935] ? setup_fault_attr+0x200/0x200 [ 1055.715339] ? lock_acquire+0x170/0x3c0 [ 1055.719379] __should_failslab+0x115/0x180 [ 1055.723691] should_failslab+0x5/0xf [ 1055.727411] __kmalloc+0x2ab/0x3c0 [ 1055.731014] ? __se_sys_memfd_create+0xf8/0x440 [ 1055.735700] __se_sys_memfd_create+0xf8/0x440 [ 1055.740210] ? memfd_file_seals_ptr+0x150/0x150 [ 1055.744977] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1055.750447] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1055.755508] ? do_syscall_64+0x21/0x620 [ 1055.759497] do_syscall_64+0xf9/0x620 [ 1055.763325] entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:05:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1055.768524] RIP: 0033:0x45deb9 [ 1055.771763] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.790682] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1055.798403] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 1055.805686] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 21:05:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1055.812970] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 1055.820255] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 1055.827534] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:05:53 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:53 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1055.903664] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1055.999431] FAULT_INJECTION: forcing a failure. [ 1055.999431] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.999874] EXT4-fs (loop2): get root inode failed [ 1056.012398] ptrace attach of "/root/syz-executor.3"[7029] was attempted by "/root/syz-executor.3"[7031] [ 1056.025600] EXT4-fs (loop2): mount failed [ 1056.026261] CPU: 1 PID: 7030 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1056.037556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.046902] Call Trace: [ 1056.049484] dump_stack+0x1fc/0x2fe [ 1056.053110] should_fail.cold+0xa/0x14 [ 1056.057000] ? setup_fault_attr+0x200/0x200 [ 1056.061329] ? lock_acquire+0x170/0x3c0 [ 1056.065340] __should_failslab+0x115/0x180 [ 1056.069579] should_failslab+0x5/0xf [ 1056.073375] kmem_cache_alloc+0x277/0x370 [ 1056.077519] ? shmem_destroy_callback+0xb0/0xb0 [ 1056.082214] shmem_alloc_inode+0x18/0x40 [ 1056.086270] ? shmem_destroy_callback+0xb0/0xb0 [ 1056.091038] alloc_inode+0x5d/0x180 [ 1056.094665] new_inode+0x1d/0xf0 [ 1056.098076] shmem_get_inode+0x96/0x8d0 [ 1056.102051] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1056.106915] shmem_file_setup+0x61/0x90 [ 1056.110898] __se_sys_memfd_create+0x26b/0x440 [ 1056.115583] ? memfd_file_seals_ptr+0x150/0x150 [ 1056.120290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1056.125691] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1056.130722] ? do_syscall_64+0x21/0x620 [ 1056.134793] do_syscall_64+0xf9/0x620 [ 1056.138598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.143831] RIP: 0033:0x45deb9 [ 1056.147010] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.166006] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1056.173706] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 1056.180973] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 1056.188238] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 21:05:53 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1056.195497] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 1056.202756] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:05:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:56 executing program 5 (fault-call:3 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc464", 0x33, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:56 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1058.673753] FAULT_INJECTION: forcing a failure. [ 1058.673753] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.685272] CPU: 0 PID: 7054 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1058.693084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.702445] Call Trace: [ 1058.705051] dump_stack+0x1fc/0x2fe [ 1058.705887] ptrace attach of "/root/syz-executor.3"[7058] was attempted by "/root/syz-executor.3"[7060] [ 1058.708795] should_fail.cold+0xa/0x14 [ 1058.708814] ? setup_fault_attr+0x200/0x200 [ 1058.726535] ? lock_acquire+0x170/0x3c0 [ 1058.730531] __should_failslab+0x115/0x180 [ 1058.734780] should_failslab+0x5/0xf [ 1058.738500] kmem_cache_alloc+0x277/0x370 [ 1058.742666] __d_alloc+0x2b/0xa10 [ 1058.746136] d_alloc_pseudo+0x19/0x70 [ 1058.749999] alloc_file_pseudo+0xc6/0x250 [ 1058.754152] ? alloc_file+0x4d0/0x4d0 [ 1058.757966] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1058.763603] ? shmem_get_inode+0x44c/0x8d0 [ 1058.767852] __shmem_file_setup.part.0+0x102/0x2b0 [ 1058.772793] shmem_file_setup+0x61/0x90 [ 1058.776781] __se_sys_memfd_create+0x26b/0x440 [ 1058.781377] ? memfd_file_seals_ptr+0x150/0x150 [ 1058.785352] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1058.786050] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1058.786068] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1058.786086] ? do_syscall_64+0x21/0x620 [ 1058.797903] EXT4-fs (loop2): get root inode failed [ 1058.802739] do_syscall_64+0xf9/0x620 [ 1058.802757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1058.802767] RIP: 0033:0x45deb9 [ 1058.802781] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1058.802789] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1058.802802] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 1058.802809] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 21:05:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x2, 0x0) 21:05:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:56 executing program 5 (fault-call:3 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1058.802817] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 1058.802825] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 1058.802833] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1058.894048] EXT4-fs (loop2): mount failed 21:05:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc464", 0x33, 0x9060}], 0x0, &(0x7f0000000080)) [ 1058.992554] FAULT_INJECTION: forcing a failure. [ 1058.992554] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.022831] CPU: 0 PID: 7083 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1059.030675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.040037] Call Trace: [ 1059.042645] dump_stack+0x1fc/0x2fe [ 1059.046291] should_fail.cold+0xa/0x14 [ 1059.050197] ? setup_fault_attr+0x200/0x200 [ 1059.054535] ? lock_acquire+0x170/0x3c0 [ 1059.058527] __should_failslab+0x115/0x180 [ 1059.062772] should_failslab+0x5/0xf [ 1059.066495] kmem_cache_alloc+0x277/0x370 [ 1059.070664] __alloc_file+0x21/0x330 [ 1059.074391] alloc_empty_file+0x6d/0x170 [ 1059.078460] alloc_file+0x5e/0x4d0 [ 1059.082014] alloc_file_pseudo+0x165/0x250 [ 1059.086259] ? alloc_file+0x4d0/0x4d0 [ 1059.090074] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1059.095701] ? shmem_get_inode+0x44c/0x8d0 [ 1059.099931] __shmem_file_setup.part.0+0x102/0x2b0 [ 1059.104849] shmem_file_setup+0x61/0x90 [ 1059.108814] __se_sys_memfd_create+0x26b/0x440 [ 1059.113386] ? memfd_file_seals_ptr+0x150/0x150 [ 1059.118042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1059.123393] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1059.128396] ? do_syscall_64+0x21/0x620 [ 1059.132358] do_syscall_64+0xf9/0x620 [ 1059.136149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.141322] RIP: 0033:0x45deb9 [ 1059.144500] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1059.163386] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1059.171080] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 1059.178333] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 1059.185585] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 21:05:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1059.192838] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 1059.200090] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1059.250078] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1059.284640] EXT4-fs (loop2): get root inode failed [ 1059.293354] EXT4-fs (loop2): mount failed 21:05:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:59 executing program 5 (fault-call:3 fault-nth:4): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000", 0x38, 0x9060}], 0x0, &(0x7f0000000080)) [ 1061.742579] FAULT_INJECTION: forcing a failure. [ 1061.742579] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.766944] CPU: 0 PID: 7126 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1061.772929] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1061.774800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.774806] Call Trace: [ 1061.774828] dump_stack+0x1fc/0x2fe [ 1061.774848] should_fail.cold+0xa/0x14 [ 1061.802365] EXT4-fs (loop2): get root inode failed [ 1061.805555] ? setup_fault_attr+0x200/0x200 [ 1061.805570] ? lock_acquire+0x170/0x3c0 [ 1061.805591] __should_failslab+0x115/0x180 [ 1061.816666] EXT4-fs (loop2): mount failed [ 1061.818782] should_failslab+0x5/0xf [ 1061.818799] kmem_cache_alloc_trace+0x284/0x380 [ 1061.818907] apparmor_file_alloc_security+0x394/0xad0 [ 1061.818924] ? apparmor_file_receive+0x160/0x160 [ 1061.845569] ? __alloc_file+0x21/0x330 [ 1061.849492] security_file_alloc+0x40/0x90 [ 1061.853712] __alloc_file+0xc9/0x330 [ 1061.857412] alloc_empty_file+0x6d/0x170 [ 1061.861456] alloc_file+0x5e/0x4d0 [ 1061.864984] alloc_file_pseudo+0x165/0x250 [ 1061.869202] ? alloc_file+0x4d0/0x4d0 [ 1061.872990] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1061.878598] ? shmem_get_inode+0x44c/0x8d0 [ 1061.882826] __shmem_file_setup.part.0+0x102/0x2b0 [ 1061.887755] shmem_file_setup+0x61/0x90 [ 1061.891739] __se_sys_memfd_create+0x26b/0x440 [ 1061.896316] ? memfd_file_seals_ptr+0x150/0x150 [ 1061.900978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1061.906343] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1061.911349] ? do_syscall_64+0x21/0x620 [ 1061.915310] do_syscall_64+0xf9/0x620 [ 1061.919141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.924324] RIP: 0033:0x45deb9 21:05:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x21, 0x0) [ 1061.927505] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1061.953365] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1061.961091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 1061.968472] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 1061.975744] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 1061.983012] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 21:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1061.990467] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:05:59 executing program 5 (fault-call:3 fault-nth:5): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd", 0x34}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:05:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000", 0x38, 0x9060}], 0x0, &(0x7f0000000080)) 21:05:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1062.106213] FAULT_INJECTION: forcing a failure. [ 1062.106213] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1062.135922] CPU: 1 PID: 7148 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1062.143777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1062.153226] Call Trace: [ 1062.155838] dump_stack+0x1fc/0x2fe [ 1062.159485] should_fail.cold+0xa/0x14 [ 1062.163382] ? lock_acquire+0x170/0x3c0 [ 1062.167367] ? setup_fault_attr+0x200/0x200 [ 1062.171797] __alloc_pages_nodemask+0x239/0x2890 [ 1062.176561] ? __lock_acquire+0x6de/0x3ff0 [ 1062.180809] ? static_obj+0x50/0x50 [ 1062.184450] ? __lock_acquire+0x6de/0x3ff0 [ 1062.188695] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1062.193549] ? __lock_acquire+0x6de/0x3ff0 [ 1062.197835] ? deref_stack_reg+0x134/0x1d0 [ 1062.202095] ? mark_held_locks+0xf0/0xf0 [ 1062.206167] ? mark_held_locks+0xf0/0xf0 [ 1062.210247] ? unwind_next_frame+0x10a9/0x1c60 [ 1062.214891] alloc_pages_vma+0xf2/0x780 [ 1062.218877] shmem_alloc_page+0x11c/0x1f0 [ 1062.223036] ? shmem_swapin+0x220/0x220 [ 1062.227042] ? percpu_counter_add_batch+0x126/0x180 [ 1062.232062] ? __vm_enough_memory+0x316/0x650 [ 1062.236554] shmem_alloc_and_acct_page+0x15a/0x850 [ 1062.241478] shmem_getpage_gfp+0x4e9/0x37f0 [ 1062.245797] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1062.250889] ? mark_held_locks+0xa6/0xf0 [ 1062.254988] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1062.260231] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1062.265410] shmem_write_begin+0xff/0x1e0 [ 1062.269550] generic_perform_write+0x1f8/0x4d0 [ 1062.274121] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1062.278779] ? current_time+0x1c0/0x1c0 [ 1062.282740] ? lock_acquire+0x170/0x3c0 [ 1062.286721] __generic_file_write_iter+0x24b/0x610 [ 1062.291640] generic_file_write_iter+0x3f8/0x729 [ 1062.296386] __vfs_write+0x51b/0x770 [ 1062.300094] ? kernel_read+0x110/0x110 [ 1062.304029] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1062.309031] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1062.313773] ? __sb_start_write+0x194/0x350 [ 1062.318083] vfs_write+0x1f3/0x540 [ 1062.321612] __x64_sys_pwrite64+0x1f7/0x250 [ 1062.325919] ? ksys_pwrite64+0x1a0/0x1a0 [ 1062.329970] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1062.334995] ? do_syscall_64+0x21/0x620 [ 1062.338956] do_syscall_64+0xf9/0x620 [ 1062.342748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1062.347920] RIP: 0033:0x417a17 [ 1062.351110] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1062.369999] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1062.377692] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417a17 [ 1062.384944] RDX: 000000000000010c RSI: 0000000020010000 RDI: 0000000000000006 [ 1062.392301] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1062.399553] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1062.406805] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000210 [ 1062.423201] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1062.435660] EXT4-fs (loop2): get root inode failed [ 1062.440816] EXT4-fs (loop2): mount failed [ 1062.480415] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 21:06:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000", 0x38, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:02 executing program 5 (fault-call:3 fault-nth:6): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1064.786590] FAULT_INJECTION: forcing a failure. [ 1064.786590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1064.796708] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1064.803373] CPU: 1 PID: 7184 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1064.817656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.825725] EXT4-fs (loop2): get root inode failed [ 1064.827009] Call Trace: [ 1064.827031] dump_stack+0x1fc/0x2fe [ 1064.827052] should_fail.cold+0xa/0x14 [ 1064.827069] ? lock_acquire+0x170/0x3c0 [ 1064.836619] EXT4-fs (loop2): mount failed [ 1064.838183] ? setup_fault_attr+0x200/0x200 [ 1064.838212] __alloc_pages_nodemask+0x239/0x2890 [ 1064.838228] ? __lock_acquire+0x6de/0x3ff0 [ 1064.863469] ? __lock_acquire+0x6de/0x3ff0 [ 1064.867720] ? __lock_acquire+0x6de/0x3ff0 [ 1064.871956] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1064.876794] ? __lock_acquire+0x6de/0x3ff0 [ 1064.881025] ? static_obj+0x50/0x50 [ 1064.884693] ? mark_held_locks+0xf0/0xf0 [ 1064.888746] alloc_pages_vma+0xf2/0x780 [ 1064.892725] shmem_alloc_page+0x11c/0x1f0 [ 1064.896907] ? shmem_swapin+0x220/0x220 [ 1064.900886] ? percpu_counter_add_batch+0x126/0x180 [ 1064.905890] ? __vm_enough_memory+0x316/0x650 [ 1064.910372] shmem_alloc_and_acct_page+0x15a/0x850 [ 1064.915295] shmem_getpage_gfp+0x4e9/0x37f0 [ 1064.919612] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1064.924709] ? mark_held_locks+0xa6/0xf0 [ 1064.928763] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1064.933953] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1064.939140] shmem_write_begin+0xff/0x1e0 [ 1064.943297] generic_perform_write+0x1f8/0x4d0 [ 1064.947867] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1064.952523] ? current_time+0x1c0/0x1c0 [ 1064.956484] ? lock_acquire+0x170/0x3c0 [ 1064.960444] __generic_file_write_iter+0x24b/0x610 [ 1064.965358] generic_file_write_iter+0x3f8/0x729 [ 1064.970108] __vfs_write+0x51b/0x770 [ 1064.973811] ? kernel_read+0x110/0x110 [ 1064.977692] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1064.982693] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1064.987449] ? __sb_start_write+0x194/0x350 [ 1064.991772] vfs_write+0x1f3/0x540 [ 1064.995304] __x64_sys_pwrite64+0x1f7/0x250 [ 1064.999614] ? ksys_pwrite64+0x1a0/0x1a0 [ 1065.003682] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1065.008686] ? do_syscall_64+0x21/0x620 [ 1065.012647] do_syscall_64+0xf9/0x620 [ 1065.016444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.021625] RIP: 0033:0x417a17 21:06:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xf0, 0x0) [ 1065.024808] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1065.043698] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1065.051415] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417a17 [ 1065.058670] RDX: 000000000000009e RSI: 0000000020011e00 RDI: 0000000000000006 [ 1065.065926] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1065.073197] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1065.080462] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000258 [ 1065.127392] EXT4-fs error (device loop5): ext4_fill_super:4448: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1065.154842] EXT4-fs (loop5): get root inode failed 21:06:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) [ 1065.178054] EXT4-fs (loop5): mount failed 21:06:02 executing program 5 (fault-call:3 fault-nth:7): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1065.294838] FAULT_INJECTION: forcing a failure. [ 1065.294838] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.306400] CPU: 1 PID: 7219 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1065.314201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.321521] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1065.323578] Call Trace: [ 1065.335285] EXT4-fs (loop2): get root inode failed [ 1065.337477] dump_stack+0x1fc/0x2fe [ 1065.337498] should_fail.cold+0xa/0x14 [ 1065.337515] ? setup_fault_attr+0x200/0x200 [ 1065.346029] EXT4-fs (loop2): mount failed [ 1065.358378] ? __lock_acquire+0x6de/0x3ff0 [ 1065.362608] __should_failslab+0x115/0x180 [ 1065.366828] should_failslab+0x5/0xf [ 1065.370532] kmem_cache_alloc+0x3f/0x370 [ 1065.374640] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1065.380253] radix_tree_extend+0x191/0x4b0 [ 1065.384477] __radix_tree_create+0x448/0x540 [ 1065.388872] __radix_tree_insert+0xbb/0x5f0 [ 1065.393195] ? __radix_tree_create+0x540/0x540 [ 1065.397762] ? lock_acquire+0x170/0x3c0 [ 1065.401718] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1065.406633] shmem_add_to_page_cache+0x616/0xbb0 [ 1065.411374] ? shmem_recalc_inode+0x310/0x310 [ 1065.415854] ? __radix_tree_preload+0x1fe/0x280 [ 1065.420511] shmem_getpage_gfp+0x2004/0x37f0 [ 1065.424936] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1065.430033] ? mark_held_locks+0xa6/0xf0 [ 1065.434078] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1065.439262] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1065.444448] shmem_write_begin+0xff/0x1e0 [ 1065.448600] generic_perform_write+0x1f8/0x4d0 [ 1065.453169] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1065.457819] ? current_time+0x1c0/0x1c0 [ 1065.461779] ? lock_acquire+0x170/0x3c0 [ 1065.465738] __generic_file_write_iter+0x24b/0x610 [ 1065.470654] generic_file_write_iter+0x3f8/0x729 [ 1065.475395] __vfs_write+0x51b/0x770 [ 1065.479100] ? kernel_read+0x110/0x110 [ 1065.483006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1065.488011] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1065.492764] ? __sb_start_write+0x194/0x350 [ 1065.497075] vfs_write+0x1f3/0x540 [ 1065.500612] __x64_sys_pwrite64+0x1f7/0x250 [ 1065.504938] ? ksys_pwrite64+0x1a0/0x1a0 [ 1065.508989] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1065.514001] ? do_syscall_64+0x21/0x620 [ 1065.517972] do_syscall_64+0xf9/0x620 [ 1065.521769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.526955] RIP: 0033:0x417a17 [ 1065.530136] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1065.549147] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1065.556872] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417a17 [ 1065.564151] RDX: 000000000000009e RSI: 0000000020011e00 RDI: 0000000000000006 [ 1065.571436] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1065.578697] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1065.585956] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000258 21:06:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:03 executing program 5 (fault-call:3 fault-nth:8): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1065.634599] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1065.763419] FAULT_INJECTION: forcing a failure. [ 1065.763419] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.783734] CPU: 0 PID: 7240 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1065.784813] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1065.791556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:06:03 executing program 5 (fault-call:3 fault-nth:9): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1065.791563] Call Trace: [ 1065.791585] dump_stack+0x1fc/0x2fe [ 1065.791606] should_fail.cold+0xa/0x14 [ 1065.791623] ? setup_fault_attr+0x200/0x200 [ 1065.791639] ? lock_acquire+0x170/0x3c0 [ 1065.791660] __should_failslab+0x115/0x180 [ 1065.791675] should_failslab+0x5/0xf [ 1065.791688] kmem_cache_alloc+0x277/0x370 [ 1065.791709] getname_flags+0xce/0x590 [ 1065.791725] do_sys_open+0x26c/0x520 [ 1065.791739] ? filp_open+0x70/0x70 [ 1065.791756] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1065.791772] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1065.791785] ? do_syscall_64+0x21/0x620 [ 1065.791800] do_syscall_64+0xf9/0x620 [ 1065.791816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1065.791826] RIP: 0033:0x4179b1 [ 1065.791838] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1065.791850] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1065.809969] EXT4-fs (loop2): get root inode failed [ 1065.812592] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 1065.812602] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fe4fe96aae0 [ 1065.812610] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1065.812617] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1065.812628] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1065.815259] EXT4-fs (loop2): mount failed [ 1065.866383] FAULT_INJECTION: forcing a failure. [ 1065.866383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1065.964908] CPU: 0 PID: 7244 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1065.972694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.982062] Call Trace: [ 1065.984642] dump_stack+0x1fc/0x2fe [ 1065.988270] should_fail.cold+0xa/0x14 [ 1065.992156] ? setup_fault_attr+0x200/0x200 [ 1065.996473] ? do_writepages+0x290/0x290 [ 1066.000517] ? unlock_page+0x13d/0x230 [ 1066.004394] __alloc_pages_nodemask+0x239/0x2890 [ 1066.009151] ? generic_perform_write+0x36c/0x4d0 [ 1066.013901] ? __lock_acquire+0x6de/0x3ff0 [ 1066.018122] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1066.022972] ? lock_downgrade+0x720/0x720 [ 1066.027103] ? lock_acquire+0x170/0x3c0 [ 1066.031078] ? up_write+0x18/0x150 [ 1066.034610] ? generic_file_write_iter+0x381/0x729 [ 1066.039526] cache_grow_begin+0xa4/0x8a0 [ 1066.043570] ? setup_fault_attr+0x200/0x200 [ 1066.047870] ? lock_acquire+0x170/0x3c0 [ 1066.051839] cache_alloc_refill+0x273/0x340 [ 1066.056155] kmem_cache_alloc+0x346/0x370 [ 1066.060300] getname_flags+0xce/0x590 [ 1066.064104] do_sys_open+0x26c/0x520 [ 1066.067804] ? filp_open+0x70/0x70 [ 1066.071350] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1066.076723] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1066.081740] ? do_syscall_64+0x21/0x620 [ 1066.085700] do_syscall_64+0xf9/0x620 [ 1066.089506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.094692] RIP: 0033:0x4179b1 [ 1066.097877] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1066.116766] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1066.124711] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 1066.131976] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fe4fe96aae0 [ 1066.139258] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1066.146511] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1066.153804] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) [ 1066.200385] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1066.325298] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1066.344756] EXT4-fs (loop2): get root inode failed [ 1066.350077] EXT4-fs (loop2): mount failed 21:06:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:05 executing program 5 (fault-call:3 fault-nth:10): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1067.810320] FAULT_INJECTION: forcing a failure. [ 1067.810320] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.845816] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: checksum invalid [ 1067.847451] CPU: 1 PID: 7273 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1067.863552] EXT4-fs (loop2): get root inode failed [ 1067.864419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.864425] Call Trace: [ 1067.864447] dump_stack+0x1fc/0x2fe [ 1067.864467] should_fail.cold+0xa/0x14 [ 1067.864485] ? setup_fault_attr+0x200/0x200 [ 1067.874923] EXT4-fs (loop2): mount failed [ 1067.878766] ? lock_acquire+0x170/0x3c0 [ 1067.878793] __should_failslab+0x115/0x180 [ 1067.878809] should_failslab+0x5/0xf [ 1067.878821] kmem_cache_alloc+0x277/0x370 [ 1067.878838] __alloc_file+0x21/0x330 [ 1067.878853] alloc_empty_file+0x6d/0x170 [ 1067.878869] path_openat+0xe9/0x2df0 [ 1067.878882] ? __lock_acquire+0x6de/0x3ff0 [ 1067.878903] ? path_lookupat+0x8d0/0x8d0 [ 1067.878919] ? mark_held_locks+0xf0/0xf0 [ 1067.878941] do_filp_open+0x18c/0x3f0 [ 1067.878954] ? may_open_dev+0xf0/0xf0 [ 1067.878968] ? __alloc_fd+0x28d/0x570 [ 1067.878986] ? lock_downgrade+0x720/0x720 [ 1067.952736] ? lock_acquire+0x170/0x3c0 [ 1067.956722] ? __alloc_fd+0x34/0x570 [ 1067.960443] ? do_raw_spin_unlock+0x171/0x230 [ 1067.964926] ? _raw_spin_unlock+0x29/0x40 [ 1067.969068] ? __alloc_fd+0x28d/0x570 [ 1067.972881] do_sys_open+0x3b3/0x520 [ 1067.976737] ? filp_open+0x70/0x70 [ 1067.980265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1067.985632] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1067.990657] ? do_syscall_64+0x21/0x620 [ 1067.994630] do_syscall_64+0xf9/0x620 [ 1067.998433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.003637] RIP: 0033:0x4179b1 [ 1068.006828] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1068.025732] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1068.033471] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 1068.040734] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fe4fe96aae0 [ 1068.047995] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1068.055261] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1068.062530] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x427, 0x0) 21:06:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:05 executing program 5 (fault-call:3 fault-nth:11): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) [ 1068.254433] FAULT_INJECTION: forcing a failure. [ 1068.254433] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.272730] CPU: 0 PID: 7302 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1068.280559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.289920] Call Trace: [ 1068.292521] dump_stack+0x1fc/0x2fe [ 1068.295632] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1068.296172] should_fail.cold+0xa/0x14 [ 1068.296195] ? setup_fault_attr+0x200/0x200 [ 1068.307837] EXT4-fs (loop2): get root inode failed [ 1068.311334] ? lock_acquire+0x170/0x3c0 [ 1068.311357] __should_failslab+0x115/0x180 [ 1068.311374] should_failslab+0x5/0xf [ 1068.311388] kmem_cache_alloc_trace+0x284/0x380 [ 1068.311408] apparmor_file_alloc_security+0x394/0xad0 [ 1068.311426] ? apparmor_file_receive+0x160/0x160 [ 1068.323898] EXT4-fs (loop2): mount failed [ 1068.324613] ? __alloc_file+0x21/0x330 [ 1068.324634] security_file_alloc+0x40/0x90 [ 1068.324650] __alloc_file+0xc9/0x330 [ 1068.363070] alloc_empty_file+0x6d/0x170 [ 1068.367119] path_openat+0xe9/0x2df0 [ 1068.370820] ? __lock_acquire+0x6de/0x3ff0 [ 1068.375061] ? path_lookupat+0x8d0/0x8d0 [ 1068.379124] ? mark_held_locks+0xf0/0xf0 [ 1068.383179] do_filp_open+0x18c/0x3f0 [ 1068.386982] ? may_open_dev+0xf0/0xf0 [ 1068.390791] ? __alloc_fd+0x28d/0x570 [ 1068.394577] ? lock_downgrade+0x720/0x720 [ 1068.398726] ? lock_acquire+0x170/0x3c0 [ 1068.402701] ? __alloc_fd+0x34/0x570 [ 1068.406402] ? do_raw_spin_unlock+0x171/0x230 [ 1068.410883] ? _raw_spin_unlock+0x29/0x40 [ 1068.415013] ? __alloc_fd+0x28d/0x570 [ 1068.418813] do_sys_open+0x3b3/0x520 [ 1068.422530] ? filp_open+0x70/0x70 [ 1068.426072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1068.431442] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1068.436462] ? do_syscall_64+0x21/0x620 [ 1068.440437] do_syscall_64+0xf9/0x620 [ 1068.444225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.449414] RIP: 0033:0x4179b1 [ 1068.452604] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1068.471492] RSP: 002b:00007fe4fe96aa20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1068.479232] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 1068.486496] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fe4fe96aae0 [ 1068.493787] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 21:06:05 executing program 5 (fault-call:3 fault-nth:12): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1068.501053] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 1068.508337] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) [ 1068.574490] FAULT_INJECTION: forcing a failure. [ 1068.574490] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.586398] CPU: 0 PID: 7315 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1068.594208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.603558] Call Trace: [ 1068.606146] dump_stack+0x1fc/0x2fe [ 1068.609775] should_fail.cold+0xa/0x14 [ 1068.613653] ? setup_fault_attr+0x200/0x200 [ 1068.617959] ? lock_acquire+0x170/0x3c0 [ 1068.621921] __should_failslab+0x115/0x180 [ 1068.626154] should_failslab+0x5/0xf [ 1068.629856] kmem_cache_alloc_trace+0x284/0x380 [ 1068.634572] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1068.639353] __kthread_create_on_node+0xd2/0x410 [ 1068.644096] ? kthread_parkme+0xa0/0xa0 [ 1068.648053] ? lo_ioctl+0x1bb/0x20e0 [ 1068.651756] ? __mutex_lock+0x3a8/0x1260 [ 1068.655801] ? lock_downgrade+0x720/0x720 [ 1068.659937] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1068.665718] kthread_create_on_node+0xbb/0xf0 [ 1068.670213] ? __kthread_create_on_node+0x410/0x410 [ 1068.675210] ? __fget+0x356/0x510 [ 1068.678667] ? do_dup2+0x450/0x450 [ 1068.682198] ? __lockdep_init_map+0x100/0x5a0 [ 1068.686676] ? __lockdep_init_map+0x100/0x5a0 [ 1068.691175] lo_ioctl+0xae5/0x20e0 [ 1068.694701] ? loop_set_status64+0x110/0x110 [ 1068.699154] blkdev_ioctl+0x5cb/0x1a7e [ 1068.703046] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.708406] ? blkpg_ioctl+0x9d0/0x9d0 [ 1068.712308] ? mark_held_locks+0xf0/0xf0 [ 1068.716352] ? mark_held_locks+0xf0/0xf0 [ 1068.720446] ? debug_check_no_obj_freed+0x201/0x482 [ 1068.725448] ? lock_downgrade+0x720/0x720 [ 1068.729617] block_ioctl+0xe9/0x130 [ 1068.733241] ? blkdev_fallocate+0x3f0/0x3f0 [ 1068.737570] do_vfs_ioctl+0xcdb/0x12e0 [ 1068.741462] ? lock_downgrade+0x720/0x720 [ 1068.745597] ? check_preemption_disabled+0x41/0x280 [ 1068.750616] ? ioctl_preallocate+0x200/0x200 [ 1068.755019] ? __fget+0x356/0x510 [ 1068.758471] ? do_dup2+0x450/0x450 [ 1068.762008] ? do_sys_open+0x2bf/0x520 [ 1068.765897] ksys_ioctl+0x9b/0xc0 [ 1068.769350] __x64_sys_ioctl+0x6f/0xb0 [ 1068.773221] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1068.777785] do_syscall_64+0xf9/0x620 [ 1068.781570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.786750] RIP: 0033:0x45dd27 [ 1068.789928] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.808816] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1068.816512] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 21:06:06 executing program 5 (fault-call:3 fault-nth:13): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1068.823765] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1068.831021] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1068.838274] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1068.845546] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1068.891643] FAULT_INJECTION: forcing a failure. [ 1068.891643] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.903073] CPU: 0 PID: 7319 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1068.910880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.920244] Call Trace: [ 1068.922849] dump_stack+0x1fc/0x2fe [ 1068.926502] should_fail.cold+0xa/0x14 [ 1068.930389] ? setup_fault_attr+0x200/0x200 [ 1068.934711] ? lock_acquire+0x170/0x3c0 [ 1068.938689] __should_failslab+0x115/0x180 [ 1068.942917] should_failslab+0x5/0xf [ 1068.946622] kmem_cache_alloc+0x277/0x370 [ 1068.950834] __kernfs_new_node+0xd2/0x680 [ 1068.954996] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1068.959746] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1068.964275] ? __cpu_to_node+0x7b/0xa0 [ 1068.968158] ? mark_held_locks+0xf0/0xf0 [ 1068.972211] ? io_schedule_timeout+0x140/0x140 [ 1068.976837] ? enqueue_entity+0xf86/0x3850 [ 1068.981105] ? set_user_nice.part.0+0x3b9/0xab0 [ 1068.985780] kernfs_create_dir_ns+0x9e/0x230 [ 1068.990189] internal_create_group+0x1c1/0xb20 [ 1068.994783] ? sysfs_remove_link_from_group+0x70/0x70 [ 1068.999974] ? lock_downgrade+0x720/0x720 [ 1069.004123] lo_ioctl+0xf7c/0x20e0 [ 1069.007662] ? loop_set_status64+0x110/0x110 [ 1069.012063] blkdev_ioctl+0x5cb/0x1a7e [ 1069.015943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.021295] ? blkpg_ioctl+0x9d0/0x9d0 [ 1069.025173] ? mark_held_locks+0xf0/0xf0 [ 1069.029225] ? mark_held_locks+0xf0/0xf0 [ 1069.033280] ? debug_check_no_obj_freed+0x201/0x482 [ 1069.038287] ? lock_downgrade+0x720/0x720 [ 1069.042456] block_ioctl+0xe9/0x130 [ 1069.046089] ? blkdev_fallocate+0x3f0/0x3f0 [ 1069.050406] do_vfs_ioctl+0xcdb/0x12e0 [ 1069.054300] ? lock_downgrade+0x720/0x720 [ 1069.058442] ? check_preemption_disabled+0x41/0x280 [ 1069.063463] ? ioctl_preallocate+0x200/0x200 [ 1069.067864] ? __fget+0x356/0x510 [ 1069.071314] ? do_dup2+0x450/0x450 [ 1069.074850] ? do_sys_open+0x2bf/0x520 [ 1069.078736] ksys_ioctl+0x9b/0xc0 [ 1069.082180] __x64_sys_ioctl+0x6f/0xb0 [ 1069.086056] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1069.090631] do_syscall_64+0xf9/0x620 [ 1069.094424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.099601] RIP: 0033:0x45dd27 [ 1069.102784] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.121696] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.129402] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1069.136658] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1069.143918] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1069.151174] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1069.158429] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1069.179024] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1069.266404] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1069.279181] EXT4-fs (loop2): get root inode failed [ 1069.284137] EXT4-fs (loop2): mount failed 21:06:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:08 executing program 5 (fault-call:3 fault-nth:14): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f000000000000", 0x3a, 0x9060}], 0x0, &(0x7f0000000080)) [ 1070.835397] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1070.849195] FAULT_INJECTION: forcing a failure. [ 1070.849195] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.859997] EXT4-fs (loop2): get root inode failed [ 1070.860952] CPU: 0 PID: 7346 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1070.865483] EXT4-fs (loop2): mount failed [ 1070.873153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.873158] Call Trace: [ 1070.873181] dump_stack+0x1fc/0x2fe [ 1070.873203] should_fail.cold+0xa/0x14 [ 1070.873219] ? setup_fault_attr+0x200/0x200 [ 1070.873234] ? lock_acquire+0x170/0x3c0 [ 1070.873258] __should_failslab+0x115/0x180 [ 1070.873273] should_failslab+0x5/0xf [ 1070.873286] kmem_cache_alloc+0x277/0x370 [ 1070.873303] __kernfs_new_node+0xd2/0x680 [ 1070.873320] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1070.873338] ? __mutex_unlock_slowpath+0xea/0x610 [ 1070.873355] ? wait_for_completion_io+0x10/0x10 [ 1070.873370] ? kernfs_next_descendant_post+0x19c/0x290 [ 1070.873393] kernfs_new_node+0x92/0x120 [ 1070.944966] __kernfs_create_file+0x51/0x33f [ 1070.949365] sysfs_add_file_mode_ns+0x226/0x540 [ 1070.954030] internal_create_group+0x355/0xb20 [ 1070.958623] ? sysfs_remove_link_from_group+0x70/0x70 [ 1070.963816] ? lock_downgrade+0x720/0x720 [ 1070.967957] lo_ioctl+0xf7c/0x20e0 [ 1070.971484] ? loop_set_status64+0x110/0x110 [ 1070.975934] blkdev_ioctl+0x5cb/0x1a7e [ 1070.979818] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.985177] ? blkpg_ioctl+0x9d0/0x9d0 [ 1070.989060] ? mark_held_locks+0xf0/0xf0 [ 1070.993116] ? mark_held_locks+0xf0/0xf0 [ 1070.997161] ? debug_check_no_obj_freed+0x201/0x482 [ 1071.002180] ? lock_downgrade+0x720/0x720 [ 1071.006324] block_ioctl+0xe9/0x130 [ 1071.009934] ? blkdev_fallocate+0x3f0/0x3f0 [ 1071.014251] do_vfs_ioctl+0xcdb/0x12e0 [ 1071.018135] ? lock_downgrade+0x720/0x720 [ 1071.022275] ? check_preemption_disabled+0x41/0x280 [ 1071.027279] ? ioctl_preallocate+0x200/0x200 [ 1071.031694] ? __fget+0x356/0x510 [ 1071.035138] ? do_dup2+0x450/0x450 [ 1071.038674] ? do_sys_open+0x2bf/0x520 [ 1071.042557] ksys_ioctl+0x9b/0xc0 [ 1071.045992] __x64_sys_ioctl+0x6f/0xb0 [ 1071.049873] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1071.054459] do_syscall_64+0xf9/0x620 [ 1071.058259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.063441] RIP: 0033:0x45dd27 [ 1071.066616] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.085510] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.093215] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1071.100475] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1071.107745] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1071.115004] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1071.122528] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1901, 0x0) 21:06:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b}], 0x0, &(0x7f0000000080)) [ 1071.163301] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:08 executing program 5 (fault-call:3 fault-nth:15): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1071.325624] FAULT_INJECTION: forcing a failure. [ 1071.325624] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.336157] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1071.337531] CPU: 1 PID: 7370 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1071.353426] EXT4-fs (loop2): get root inode failed [ 1071.355948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.355953] Call Trace: [ 1071.355975] dump_stack+0x1fc/0x2fe [ 1071.355993] should_fail.cold+0xa/0x14 [ 1071.356010] ? setup_fault_attr+0x200/0x200 [ 1071.361061] EXT4-fs (loop2): mount failed [ 1071.370280] ? lock_acquire+0x170/0x3c0 [ 1071.370306] __should_failslab+0x115/0x180 [ 1071.370321] should_failslab+0x5/0xf [ 1071.370334] kmem_cache_alloc+0x277/0x370 [ 1071.370348] __kernfs_new_node+0xd2/0x680 [ 1071.370363] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1071.413916] ? __mutex_unlock_slowpath+0xea/0x610 [ 1071.418748] ? wait_for_completion_io+0x10/0x10 [ 1071.423420] ? kernfs_next_descendant_post+0x19c/0x290 [ 1071.428690] kernfs_new_node+0x92/0x120 [ 1071.432666] __kernfs_create_file+0x51/0x33f [ 1071.437074] sysfs_add_file_mode_ns+0x226/0x540 [ 1071.441753] internal_create_group+0x355/0xb20 [ 1071.446325] ? sysfs_remove_link_from_group+0x70/0x70 [ 1071.451525] ? lock_downgrade+0x720/0x720 [ 1071.455675] lo_ioctl+0xf7c/0x20e0 [ 1071.459211] ? loop_set_status64+0x110/0x110 [ 1071.463654] blkdev_ioctl+0x5cb/0x1a7e [ 1071.467536] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.472893] ? blkpg_ioctl+0x9d0/0x9d0 [ 1071.476762] ? mark_held_locks+0xf0/0xf0 [ 1071.480806] ? mark_held_locks+0xf0/0xf0 [ 1071.484854] ? debug_check_no_obj_freed+0x201/0x482 [ 1071.489858] ? lock_downgrade+0x720/0x720 [ 1071.494008] block_ioctl+0xe9/0x130 [ 1071.497616] ? blkdev_fallocate+0x3f0/0x3f0 [ 1071.501920] do_vfs_ioctl+0xcdb/0x12e0 [ 1071.505793] ? lock_downgrade+0x720/0x720 [ 1071.509923] ? check_preemption_disabled+0x41/0x280 [ 1071.514945] ? ioctl_preallocate+0x200/0x200 [ 1071.519338] ? __fget+0x356/0x510 [ 1071.522773] ? do_dup2+0x450/0x450 [ 1071.526305] ? do_sys_open+0x2bf/0x520 [ 1071.530188] ksys_ioctl+0x9b/0xc0 [ 1071.533643] __x64_sys_ioctl+0x6f/0xb0 [ 1071.537535] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1071.542120] do_syscall_64+0xf9/0x620 [ 1071.545920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.551129] RIP: 0033:0x45dd27 [ 1071.554325] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.573240] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.580937] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1071.588192] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1071.595442] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1071.602695] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1071.609947] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1071.636479] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:09 executing program 5 (fault-call:3 fault-nth:16): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b}], 0x0, &(0x7f0000000080)) [ 1071.755056] FAULT_INJECTION: forcing a failure. [ 1071.755056] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.767232] CPU: 0 PID: 7385 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1071.775047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.784398] Call Trace: [ 1071.786988] dump_stack+0x1fc/0x2fe [ 1071.790627] should_fail.cold+0xa/0x14 [ 1071.794520] ? setup_fault_attr+0x200/0x200 [ 1071.798831] ? lock_acquire+0x170/0x3c0 [ 1071.802801] __should_failslab+0x115/0x180 [ 1071.807024] should_failslab+0x5/0xf [ 1071.810735] kmem_cache_alloc+0x277/0x370 [ 1071.814889] __kernfs_new_node+0xd2/0x680 [ 1071.819132] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1071.823927] ? kernfs_activate+0x2c/0x1d0 [ 1071.828077] ? lock_downgrade+0x720/0x720 [ 1071.832224] ? kernfs_add_one+0x51/0x4c0 [ 1071.836276] ? __mutex_add_waiter+0x160/0x160 [ 1071.840773] ? __mutex_unlock_slowpath+0xea/0x610 [ 1071.845614] kernfs_new_node+0x92/0x120 [ 1071.849590] __kernfs_create_file+0x51/0x33f [ 1071.853999] sysfs_add_file_mode_ns+0x226/0x540 [ 1071.858676] internal_create_group+0x355/0xb20 [ 1071.863257] ? sysfs_remove_link_from_group+0x70/0x70 [ 1071.868443] ? lock_downgrade+0x720/0x720 [ 1071.872611] lo_ioctl+0xf7c/0x20e0 [ 1071.876153] ? loop_set_status64+0x110/0x110 [ 1071.880572] blkdev_ioctl+0x5cb/0x1a7e [ 1071.884445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.889806] ? blkpg_ioctl+0x9d0/0x9d0 [ 1071.893701] ? mark_held_locks+0xf0/0xf0 [ 1071.897767] ? mark_held_locks+0xf0/0xf0 [ 1071.901835] ? debug_check_no_obj_freed+0x201/0x482 [ 1071.906848] ? lock_downgrade+0x720/0x720 [ 1071.910996] block_ioctl+0xe9/0x130 [ 1071.914626] ? blkdev_fallocate+0x3f0/0x3f0 [ 1071.918943] do_vfs_ioctl+0xcdb/0x12e0 [ 1071.922817] ? lock_downgrade+0x720/0x720 [ 1071.926949] ? check_preemption_disabled+0x41/0x280 [ 1071.931951] ? ioctl_preallocate+0x200/0x200 [ 1071.936352] ? __fget+0x356/0x510 [ 1071.939804] ? do_dup2+0x450/0x450 [ 1071.943338] ? do_sys_open+0x2bf/0x520 [ 1071.947213] ksys_ioctl+0x9b/0xc0 [ 1071.950683] __x64_sys_ioctl+0x6f/0xb0 [ 1071.954584] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1071.959158] do_syscall_64+0xf9/0x620 [ 1071.962953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.968150] RIP: 0033:0x45dd27 [ 1071.971344] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.990344] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.998067] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1072.005341] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1072.012616] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1072.019888] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1072.027178] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:09 executing program 5 (fault-call:3 fault-nth:17): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1072.075900] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1072.092802] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1072.130830] EXT4-fs (loop2): get root inode failed [ 1072.139642] EXT4-fs (loop2): mount failed [ 1072.172741] FAULT_INJECTION: forcing a failure. [ 1072.172741] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.184261] CPU: 0 PID: 7399 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1072.192068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.201482] Call Trace: [ 1072.204073] dump_stack+0x1fc/0x2fe [ 1072.207712] should_fail.cold+0xa/0x14 [ 1072.211608] ? setup_fault_attr+0x200/0x200 [ 1072.216043] ? lock_acquire+0x170/0x3c0 [ 1072.220017] __should_failslab+0x115/0x180 [ 1072.224241] should_failslab+0x5/0xf [ 1072.227958] kmem_cache_alloc+0x277/0x370 [ 1072.232103] __kernfs_new_node+0xd2/0x680 [ 1072.236237] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1072.240985] ? __mutex_unlock_slowpath+0xea/0x610 [ 1072.245814] ? wait_for_completion_io+0x10/0x10 [ 1072.250478] ? kernfs_next_descendant_post+0x19c/0x290 [ 1072.255778] kernfs_new_node+0x92/0x120 [ 1072.259756] __kernfs_create_file+0x51/0x33f [ 1072.264175] sysfs_add_file_mode_ns+0x226/0x540 [ 1072.268857] internal_create_group+0x355/0xb20 [ 1072.273441] ? sysfs_remove_link_from_group+0x70/0x70 [ 1072.278626] ? lock_downgrade+0x720/0x720 [ 1072.282815] lo_ioctl+0xf7c/0x20e0 [ 1072.286349] ? loop_set_status64+0x110/0x110 [ 1072.290773] blkdev_ioctl+0x5cb/0x1a7e [ 1072.294671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.300028] ? blkpg_ioctl+0x9d0/0x9d0 [ 1072.303909] ? mark_held_locks+0xf0/0xf0 [ 1072.307971] ? mark_held_locks+0xf0/0xf0 [ 1072.312043] ? debug_check_no_obj_freed+0x201/0x482 [ 1072.317118] ? lock_downgrade+0x720/0x720 [ 1072.321254] block_ioctl+0xe9/0x130 [ 1072.324884] ? blkdev_fallocate+0x3f0/0x3f0 [ 1072.329201] do_vfs_ioctl+0xcdb/0x12e0 [ 1072.333098] ? lock_downgrade+0x720/0x720 [ 1072.337246] ? check_preemption_disabled+0x41/0x280 [ 1072.342262] ? ioctl_preallocate+0x200/0x200 [ 1072.346656] ? __fget+0x356/0x510 [ 1072.350107] ? do_dup2+0x450/0x450 [ 1072.353643] ? do_sys_open+0x2bf/0x520 [ 1072.357543] ksys_ioctl+0x9b/0xc0 [ 1072.361004] __x64_sys_ioctl+0x6f/0xb0 [ 1072.364899] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1072.369476] do_syscall_64+0xf9/0x620 [ 1072.373274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.378450] RIP: 0033:0x45dd27 [ 1072.381745] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.400640] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1072.408475] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1072.415744] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1072.423069] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1072.430337] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1072.437608] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:09 executing program 5 (fault-call:3 fault-nth:18): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1072.505251] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1072.615745] FAULT_INJECTION: forcing a failure. [ 1072.615745] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.627275] CPU: 0 PID: 7410 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1072.635065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.644427] Call Trace: [ 1072.647010] dump_stack+0x1fc/0x2fe [ 1072.650642] should_fail.cold+0xa/0x14 [ 1072.654527] ? setup_fault_attr+0x200/0x200 [ 1072.658835] ? lock_acquire+0x170/0x3c0 [ 1072.662798] __should_failslab+0x115/0x180 [ 1072.667016] should_failslab+0x5/0xf [ 1072.670723] kmem_cache_alloc+0x277/0x370 [ 1072.674867] __kernfs_new_node+0xd2/0x680 [ 1072.679011] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1072.683754] ? __mutex_unlock_slowpath+0xea/0x610 [ 1072.688595] ? wait_for_completion_io+0x10/0x10 [ 1072.693257] ? kernfs_next_descendant_post+0x19c/0x290 [ 1072.698524] kernfs_new_node+0x92/0x120 [ 1072.702494] __kernfs_create_file+0x51/0x33f [ 1072.706886] sysfs_add_file_mode_ns+0x226/0x540 [ 1072.711647] internal_create_group+0x355/0xb20 [ 1072.716231] ? sysfs_remove_link_from_group+0x70/0x70 [ 1072.721405] ? lock_downgrade+0x720/0x720 [ 1072.725542] lo_ioctl+0xf7c/0x20e0 [ 1072.729085] ? loop_set_status64+0x110/0x110 [ 1072.733492] blkdev_ioctl+0x5cb/0x1a7e [ 1072.737362] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.742722] ? blkpg_ioctl+0x9d0/0x9d0 [ 1072.746601] ? mark_held_locks+0xf0/0xf0 [ 1072.750658] ? mark_held_locks+0xf0/0xf0 [ 1072.754759] ? debug_check_no_obj_freed+0x201/0x482 [ 1072.759765] ? lock_downgrade+0x720/0x720 [ 1072.763903] block_ioctl+0xe9/0x130 [ 1072.767541] ? blkdev_fallocate+0x3f0/0x3f0 [ 1072.771868] do_vfs_ioctl+0xcdb/0x12e0 [ 1072.775768] ? lock_downgrade+0x720/0x720 [ 1072.779923] ? check_preemption_disabled+0x41/0x280 [ 1072.784952] ? ioctl_preallocate+0x200/0x200 [ 1072.789362] ? __fget+0x356/0x510 [ 1072.792810] ? do_dup2+0x450/0x450 [ 1072.796348] ? do_sys_open+0x2bf/0x520 [ 1072.800243] ksys_ioctl+0x9b/0xc0 [ 1072.803682] __x64_sys_ioctl+0x6f/0xb0 [ 1072.807571] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1072.812155] do_syscall_64+0xf9/0x620 [ 1072.815955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.821127] RIP: 0033:0x45dd27 [ 1072.824302] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.843802] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1072.851504] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1072.858768] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1072.866020] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1072.873303] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1072.880580] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1072.904115] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b}], 0x0, &(0x7f0000000080)) 21:06:11 executing program 5 (fault-call:3 fault-nth:19): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1073.874397] FAULT_INJECTION: forcing a failure. [ 1073.874397] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.885839] CPU: 1 PID: 7424 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1073.893628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.902988] Call Trace: [ 1073.905583] dump_stack+0x1fc/0x2fe [ 1073.909201] should_fail.cold+0xa/0x14 [ 1073.913087] ? setup_fault_attr+0x200/0x200 [ 1073.917414] ? lock_acquire+0x170/0x3c0 [ 1073.921404] __should_failslab+0x115/0x180 [ 1073.925643] should_failslab+0x5/0xf [ 1073.929342] kmem_cache_alloc+0x277/0x370 [ 1073.933476] __kernfs_new_node+0xd2/0x680 [ 1073.937617] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1073.942386] ? __mutex_unlock_slowpath+0xea/0x610 [ 1073.947239] ? wait_for_completion_io+0x10/0x10 [ 1073.951907] ? kernfs_next_descendant_post+0x19c/0x290 [ 1073.957186] kernfs_new_node+0x92/0x120 [ 1073.961194] __kernfs_create_file+0x51/0x33f [ 1073.965627] sysfs_add_file_mode_ns+0x226/0x540 [ 1073.970310] internal_create_group+0x355/0xb20 [ 1073.974897] ? sysfs_remove_link_from_group+0x70/0x70 [ 1073.980079] ? lock_downgrade+0x720/0x720 [ 1073.984243] lo_ioctl+0xf7c/0x20e0 [ 1073.987792] ? loop_set_status64+0x110/0x110 [ 1073.992210] blkdev_ioctl+0x5cb/0x1a7e [ 1073.996095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.001458] ? blkpg_ioctl+0x9d0/0x9d0 [ 1074.005349] ? mark_held_locks+0xf0/0xf0 [ 1074.009406] ? mark_held_locks+0xf0/0xf0 [ 1074.013456] ? debug_check_no_obj_freed+0x201/0x482 [ 1074.018474] ? lock_downgrade+0x720/0x720 [ 1074.022630] block_ioctl+0xe9/0x130 [ 1074.026259] ? blkdev_fallocate+0x3f0/0x3f0 [ 1074.030587] do_vfs_ioctl+0xcdb/0x12e0 [ 1074.034472] ? lock_downgrade+0x720/0x720 [ 1074.038615] ? check_preemption_disabled+0x41/0x280 [ 1074.043660] ? ioctl_preallocate+0x200/0x200 [ 1074.048057] ? __fget+0x356/0x510 [ 1074.051515] ? do_dup2+0x450/0x450 [ 1074.055039] ? do_sys_open+0x2bf/0x520 [ 1074.058927] ksys_ioctl+0x9b/0xc0 [ 1074.062375] __x64_sys_ioctl+0x6f/0xb0 [ 1074.066259] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1074.070849] do_syscall_64+0xf9/0x620 [ 1074.074653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.079835] RIP: 0033:0x45dd27 [ 1074.083036] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1074.101970] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.109689] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1074.116955] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1074.124219] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1074.131485] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1074.138744] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x2704, 0x0) 21:06:11 executing program 5 (fault-call:3 fault-nth:20): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1074.174928] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1074.200064] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1074.212944] EXT4-fs (loop2): get root inode failed [ 1074.220171] EXT4-fs (loop2): mount failed 21:06:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1074.335027] FAULT_INJECTION: forcing a failure. [ 1074.335027] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.352260] CPU: 1 PID: 7439 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1074.360082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.369441] Call Trace: [ 1074.372044] dump_stack+0x1fc/0x2fe [ 1074.375699] should_fail.cold+0xa/0x14 [ 1074.379603] ? setup_fault_attr+0x200/0x200 [ 1074.383923] ? lock_acquire+0x170/0x3c0 [ 1074.387907] __should_failslab+0x115/0x180 [ 1074.392136] should_failslab+0x5/0xf [ 1074.395831] __kmalloc+0x2ab/0x3c0 [ 1074.399368] ? kobject_get_path+0xbf/0x240 [ 1074.403608] kobject_get_path+0xbf/0x240 [ 1074.407671] kobject_uevent_env+0x25c/0x14a0 [ 1074.412079] lo_ioctl+0xff9/0x20e0 [ 1074.415607] ? loop_set_status64+0x110/0x110 [ 1074.420002] blkdev_ioctl+0x5cb/0x1a7e [ 1074.423873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.429233] ? blkpg_ioctl+0x9d0/0x9d0 [ 1074.433122] ? mark_held_locks+0xf0/0xf0 [ 1074.437171] ? mark_held_locks+0xf0/0xf0 [ 1074.441219] ? debug_check_no_obj_freed+0x201/0x482 [ 1074.446222] ? lock_downgrade+0x720/0x720 [ 1074.450357] block_ioctl+0xe9/0x130 [ 1074.453981] ? blkdev_fallocate+0x3f0/0x3f0 [ 1074.458299] do_vfs_ioctl+0xcdb/0x12e0 [ 1074.462183] ? lock_downgrade+0x720/0x720 [ 1074.466315] ? check_preemption_disabled+0x41/0x280 [ 1074.471315] ? ioctl_preallocate+0x200/0x200 [ 1074.475706] ? __fget+0x356/0x510 [ 1074.479159] ? do_dup2+0x450/0x450 [ 1074.482691] ? do_sys_open+0x2bf/0x520 [ 1074.486579] ksys_ioctl+0x9b/0xc0 [ 1074.490018] __x64_sys_ioctl+0x6f/0xb0 [ 1074.493888] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1074.498465] do_syscall_64+0xf9/0x620 [ 1074.502264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.507445] RIP: 0033:0x45dd27 [ 1074.510642] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1074.529545] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.537251] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1074.544507] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1074.551767] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1074.559041] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1074.566310] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:12 executing program 5 (fault-call:3 fault-nth:21): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1074.621898] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1074.695644] FAULT_INJECTION: forcing a failure. [ 1074.695644] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.707103] CPU: 1 PID: 7462 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1074.714908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.724283] Call Trace: [ 1074.726862] dump_stack+0x1fc/0x2fe [ 1074.730491] should_fail.cold+0xa/0x14 [ 1074.734398] ? setup_fault_attr+0x200/0x200 [ 1074.738706] ? lock_acquire+0x170/0x3c0 [ 1074.742745] ? dev_uevent_filter+0xd0/0xd0 [ 1074.746983] __should_failslab+0x115/0x180 [ 1074.751226] should_failslab+0x5/0xf [ 1074.754939] kmem_cache_alloc_trace+0x284/0x380 [ 1074.759639] ? dev_uevent_filter+0xd0/0xd0 [ 1074.763877] kobject_uevent_env+0x236/0x14a0 [ 1074.768297] lo_ioctl+0xff9/0x20e0 [ 1074.771851] ? loop_set_status64+0x110/0x110 [ 1074.776258] blkdev_ioctl+0x5cb/0x1a7e [ 1074.780142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.785554] ? blkpg_ioctl+0x9d0/0x9d0 [ 1074.789439] ? mark_held_locks+0xf0/0xf0 [ 1074.793505] ? mark_held_locks+0xf0/0xf0 [ 1074.797998] ? debug_check_no_obj_freed+0x201/0x482 [ 1074.803003] ? lock_downgrade+0x720/0x720 [ 1074.807135] block_ioctl+0xe9/0x130 [ 1074.810754] ? blkdev_fallocate+0x3f0/0x3f0 [ 1074.815070] do_vfs_ioctl+0xcdb/0x12e0 [ 1074.818956] ? lock_downgrade+0x720/0x720 [ 1074.823117] ? check_preemption_disabled+0x41/0x280 [ 1074.828137] ? ioctl_preallocate+0x200/0x200 [ 1074.832542] ? __fget+0x356/0x510 [ 1074.835979] ? do_dup2+0x450/0x450 [ 1074.839500] ? do_sys_open+0x2bf/0x520 [ 1074.843375] ksys_ioctl+0x9b/0xc0 [ 1074.846811] __x64_sys_ioctl+0x6f/0xb0 [ 1074.850693] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1074.855270] do_syscall_64+0xf9/0x620 [ 1074.859071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.864243] RIP: 0033:0x45dd27 [ 1074.867438] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1074.886339] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.894037] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1074.901296] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1074.908560] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1074.915832] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1074.923161] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:12 executing program 5 (fault-call:3 fault-nth:22): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1074.960881] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1074.971337] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1075.101911] FAULT_INJECTION: forcing a failure. [ 1075.101911] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.113316] CPU: 1 PID: 7476 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1075.121254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.130739] Call Trace: [ 1075.133319] dump_stack+0x1fc/0x2fe [ 1075.136935] should_fail.cold+0xa/0x14 [ 1075.140821] ? setup_fault_attr+0x200/0x200 [ 1075.145136] ? lock_acquire+0x170/0x3c0 [ 1075.149097] __should_failslab+0x115/0x180 [ 1075.153360] should_failslab+0x5/0xf [ 1075.157063] __kmalloc+0x2ab/0x3c0 [ 1075.160609] ? kobject_get_path+0xbf/0x240 [ 1075.164837] kobject_get_path+0xbf/0x240 [ 1075.168886] kobject_uevent_env+0x25c/0x14a0 [ 1075.173282] lo_ioctl+0xff9/0x20e0 [ 1075.176808] ? loop_set_status64+0x110/0x110 [ 1075.181214] blkdev_ioctl+0x5cb/0x1a7e [ 1075.185107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.190466] ? blkpg_ioctl+0x9d0/0x9d0 [ 1075.194339] ? mark_held_locks+0xf0/0xf0 [ 1075.198395] ? mark_held_locks+0xf0/0xf0 [ 1075.202449] ? debug_check_no_obj_freed+0x201/0x482 [ 1075.207451] ? lock_downgrade+0x720/0x720 [ 1075.211593] block_ioctl+0xe9/0x130 [ 1075.215209] ? blkdev_fallocate+0x3f0/0x3f0 [ 1075.219528] do_vfs_ioctl+0xcdb/0x12e0 [ 1075.223424] ? lock_downgrade+0x720/0x720 [ 1075.227555] ? check_preemption_disabled+0x41/0x280 [ 1075.232584] ? ioctl_preallocate+0x200/0x200 [ 1075.236978] ? __fget+0x356/0x510 [ 1075.240425] ? do_dup2+0x450/0x450 [ 1075.243969] ? do_sys_open+0x2bf/0x520 [ 1075.247868] ksys_ioctl+0x9b/0xc0 [ 1075.251307] __x64_sys_ioctl+0x6f/0xb0 [ 1075.255186] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1075.259767] do_syscall_64+0xf9/0x620 [ 1075.263563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.268750] RIP: 0033:0x45dd27 [ 1075.271928] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.290823] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.298528] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1075.305800] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1075.313062] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1075.320408] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1075.327679] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:12 executing program 5 (fault-call:3 fault-nth:23): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1075.374946] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1075.507945] FAULT_INJECTION: forcing a failure. [ 1075.507945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.519800] CPU: 0 PID: 7486 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1075.527595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.536955] Call Trace: [ 1075.539565] dump_stack+0x1fc/0x2fe [ 1075.543203] should_fail.cold+0xa/0x14 [ 1075.547099] ? setup_fault_attr+0x200/0x200 [ 1075.551427] ? lock_acquire+0x170/0x3c0 [ 1075.555405] ? kernfs_activate+0x2c/0x1d0 [ 1075.559568] __alloc_pages_nodemask+0x239/0x2890 [ 1075.565034] ? __mutex_lock+0x3a8/0x1260 [ 1075.569219] ? kernfs_add_one+0x36a/0x4c0 [ 1075.573380] ? __lock_acquire+0x6de/0x3ff0 [ 1075.577629] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1075.582483] ? __mutex_unlock_slowpath+0xea/0x610 [ 1075.587338] ? kernfs_next_descendant_post+0x19c/0x290 [ 1075.592625] ? kernfs_add_one+0x124/0x4c0 [ 1075.596791] cache_grow_begin+0xa4/0x8a0 [ 1075.600861] ? setup_fault_attr+0x200/0x200 [ 1075.605188] ? lock_acquire+0x170/0x3c0 [ 1075.610125] cache_alloc_refill+0x273/0x340 [ 1075.614453] kmem_cache_alloc_trace+0x354/0x380 [ 1075.619124] ? dev_uevent_filter+0xd0/0xd0 [ 1075.623362] kobject_uevent_env+0x236/0x14a0 [ 1075.627781] lo_ioctl+0xff9/0x20e0 [ 1075.631335] ? loop_set_status64+0x110/0x110 [ 1075.635755] blkdev_ioctl+0x5cb/0x1a7e [ 1075.639647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.645018] ? blkpg_ioctl+0x9d0/0x9d0 [ 1075.648910] ? mark_held_locks+0xf0/0xf0 [ 1075.652981] ? mark_held_locks+0xf0/0xf0 [ 1075.657047] ? debug_check_no_obj_freed+0x201/0x482 [ 1075.662067] ? lock_downgrade+0x720/0x720 [ 1075.666220] block_ioctl+0xe9/0x130 [ 1075.669850] ? blkdev_fallocate+0x3f0/0x3f0 [ 1075.674289] do_vfs_ioctl+0xcdb/0x12e0 [ 1075.678181] ? lock_downgrade+0x720/0x720 [ 1075.682331] ? check_preemption_disabled+0x41/0x280 [ 1075.687348] ? ioctl_preallocate+0x200/0x200 [ 1075.691762] ? __fget+0x356/0x510 [ 1075.695220] ? do_dup2+0x450/0x450 [ 1075.698767] ? do_sys_open+0x2bf/0x520 [ 1075.702663] ksys_ioctl+0x9b/0xc0 [ 1075.706121] __x64_sys_ioctl+0x6f/0xb0 [ 1075.710010] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1075.714592] do_syscall_64+0xf9/0x620 [ 1075.718400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.723590] RIP: 0033:0x45dd27 [ 1075.726780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.745779] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.753494] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1075.760778] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1075.768398] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1075.775672] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1075.782953] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1075.841983] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1075.853343] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:14 executing program 5 (fault-call:3 fault-nth:24): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1076.890824] FAULT_INJECTION: forcing a failure. [ 1076.890824] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.903755] CPU: 0 PID: 7501 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1076.911642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.920987] Call Trace: [ 1076.923649] dump_stack+0x1fc/0x2fe [ 1076.927367] should_fail.cold+0xa/0x14 [ 1076.931384] ? setup_fault_attr+0x200/0x200 [ 1076.935690] ? lock_acquire+0x170/0x3c0 [ 1076.939668] __should_failslab+0x115/0x180 [ 1076.943947] should_failslab+0x5/0xf [ 1076.947646] kmem_cache_alloc_node+0x245/0x3b0 [ 1076.952303] __alloc_skb+0x71/0x560 [ 1076.955944] alloc_uevent_skb+0x7b/0x210 [ 1076.960027] kobject_uevent_env+0xa83/0x14a0 [ 1076.964441] lo_ioctl+0xff9/0x20e0 [ 1076.967987] ? loop_set_status64+0x110/0x110 [ 1076.972410] blkdev_ioctl+0x5cb/0x1a7e [ 1076.976310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.981724] ? blkpg_ioctl+0x9d0/0x9d0 [ 1076.985649] ? mark_held_locks+0xf0/0xf0 [ 1076.989693] ? mark_held_locks+0xf0/0xf0 [ 1076.993742] ? debug_check_no_obj_freed+0x201/0x482 [ 1076.998758] ? lock_downgrade+0x720/0x720 [ 1077.002901] block_ioctl+0xe9/0x130 [ 1077.006510] ? blkdev_fallocate+0x3f0/0x3f0 [ 1077.010815] do_vfs_ioctl+0xcdb/0x12e0 [ 1077.014688] ? lock_downgrade+0x720/0x720 [ 1077.018848] ? check_preemption_disabled+0x41/0x280 [ 1077.023894] ? ioctl_preallocate+0x200/0x200 [ 1077.028298] ? __fget+0x356/0x510 [ 1077.031879] ? do_dup2+0x450/0x450 [ 1077.035403] ? do_sys_open+0x2bf/0x520 [ 1077.039292] ksys_ioctl+0x9b/0xc0 [ 1077.042741] __x64_sys_ioctl+0x6f/0xb0 [ 1077.046611] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.051179] do_syscall_64+0xf9/0x620 [ 1077.054969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.060170] RIP: 0033:0x45dd27 [ 1077.063453] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.082363] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.090059] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1077.097337] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1077.104600] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1077.111859] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1077.119128] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 [ 1077.156559] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1077.189486] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x4000, 0x0) 21:06:14 executing program 5 (fault-call:3 fault-nth:25): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1077.368968] FAULT_INJECTION: forcing a failure. [ 1077.368968] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.380457] CPU: 1 PID: 7522 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1077.388262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.397622] Call Trace: [ 1077.400222] dump_stack+0x1fc/0x2fe [ 1077.403859] should_fail.cold+0xa/0x14 [ 1077.407758] ? setup_fault_attr+0x200/0x200 [ 1077.412091] ? lock_acquire+0x170/0x3c0 21:06:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1077.416086] __should_failslab+0x115/0x180 [ 1077.420332] should_failslab+0x5/0xf [ 1077.424052] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1077.429154] __kmalloc_node_track_caller+0x38/0x70 [ 1077.434071] __alloc_skb+0xae/0x560 [ 1077.437688] alloc_uevent_skb+0x7b/0x210 [ 1077.441735] kobject_uevent_env+0xa83/0x14a0 [ 1077.446133] lo_ioctl+0xff9/0x20e0 [ 1077.449659] ? loop_set_status64+0x110/0x110 [ 1077.454052] blkdev_ioctl+0x5cb/0x1a7e [ 1077.457921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.463376] ? blkpg_ioctl+0x9d0/0x9d0 [ 1077.467255] ? mark_held_locks+0xf0/0xf0 [ 1077.472083] ? mark_held_locks+0xf0/0xf0 [ 1077.476148] ? debug_check_no_obj_freed+0x201/0x482 [ 1077.481191] ? lock_downgrade+0x720/0x720 [ 1077.485325] block_ioctl+0xe9/0x130 [ 1077.488933] ? blkdev_fallocate+0x3f0/0x3f0 [ 1077.493248] do_vfs_ioctl+0xcdb/0x12e0 [ 1077.497119] ? lock_downgrade+0x720/0x720 [ 1077.501248] ? check_preemption_disabled+0x41/0x280 [ 1077.506245] ? ioctl_preallocate+0x200/0x200 [ 1077.510679] ? __fget+0x356/0x510 [ 1077.514116] ? do_dup2+0x450/0x450 [ 1077.517638] ? do_sys_open+0x2bf/0x520 [ 1077.521523] ksys_ioctl+0x9b/0xc0 [ 1077.524969] __x64_sys_ioctl+0x6f/0xb0 [ 1077.528847] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.533422] do_syscall_64+0xf9/0x620 [ 1077.537229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.542401] RIP: 0033:0x45dd27 [ 1077.545578] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.564464] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.572164] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1077.579432] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1077.586687] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1077.594894] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1077.602145] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:15 executing program 5 (fault-call:3 fault-nth:26): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1077.642585] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1077.686121] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1077.742572] FAULT_INJECTION: forcing a failure. [ 1077.742572] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.754092] CPU: 1 PID: 7549 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1077.761889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.771233] Call Trace: [ 1077.773819] dump_stack+0x1fc/0x2fe [ 1077.777433] should_fail.cold+0xa/0x14 [ 1077.781308] ? setup_fault_attr+0x200/0x200 [ 1077.785723] ? lock_acquire+0x170/0x3c0 [ 1077.789692] __should_failslab+0x115/0x180 [ 1077.793928] should_failslab+0x5/0xf [ 1077.797677] kmem_cache_alloc_trace+0x284/0x380 [ 1077.802345] ? wait_for_completion_io+0x10/0x10 [ 1077.807000] ? kobject_init_and_add.cold+0x16/0x16 [ 1077.812003] call_usermodehelper_setup+0x84/0x300 [ 1077.816850] kobject_uevent_env+0xe87/0x14a0 [ 1077.821257] lo_ioctl+0xff9/0x20e0 [ 1077.824791] ? loop_set_status64+0x110/0x110 [ 1077.829187] blkdev_ioctl+0x5cb/0x1a7e [ 1077.833070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.838430] ? blkpg_ioctl+0x9d0/0x9d0 [ 1077.842304] ? mark_held_locks+0xf0/0xf0 [ 1077.846347] ? mark_held_locks+0xf0/0xf0 [ 1077.850431] ? debug_check_no_obj_freed+0x201/0x482 [ 1077.855490] ? lock_downgrade+0x720/0x720 [ 1077.859623] block_ioctl+0xe9/0x130 [ 1077.863231] ? blkdev_fallocate+0x3f0/0x3f0 [ 1077.867547] do_vfs_ioctl+0xcdb/0x12e0 [ 1077.871429] ? lock_downgrade+0x720/0x720 [ 1077.875560] ? check_preemption_disabled+0x41/0x280 [ 1077.880560] ? ioctl_preallocate+0x200/0x200 [ 1077.884954] ? __fget+0x356/0x510 [ 1077.888391] ? do_dup2+0x450/0x450 [ 1077.891914] ? do_sys_open+0x2bf/0x520 [ 1077.895789] ksys_ioctl+0x9b/0xc0 [ 1077.899237] __x64_sys_ioctl+0x6f/0xb0 [ 1077.903115] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.907693] do_syscall_64+0xf9/0x620 [ 1077.911477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.916646] RIP: 0033:0x45dd27 [ 1077.919833] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.938735] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.946452] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1077.953714] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1077.960969] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1077.968221] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1077.975471] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:15 executing program 5 (fault-call:3 fault-nth:27): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1078.005895] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1078.099556] FAULT_INJECTION: forcing a failure. [ 1078.099556] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.115709] CPU: 0 PID: 7557 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1078.123526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.132867] Call Trace: [ 1078.135444] dump_stack+0x1fc/0x2fe [ 1078.139061] should_fail.cold+0xa/0x14 [ 1078.142992] ? setup_fault_attr+0x200/0x200 [ 1078.147367] ? lock_acquire+0x170/0x3c0 [ 1078.151342] __should_failslab+0x115/0x180 [ 1078.155564] should_failslab+0x5/0xf [ 1078.159268] kmem_cache_alloc_trace+0x284/0x380 [ 1078.163920] ? wait_for_completion_io+0x10/0x10 [ 1078.168573] ? kobject_init_and_add.cold+0x16/0x16 [ 1078.173501] call_usermodehelper_setup+0x84/0x300 [ 1078.178356] kobject_uevent_env+0xe87/0x14a0 [ 1078.182969] lo_ioctl+0xff9/0x20e0 [ 1078.186502] ? loop_set_status64+0x110/0x110 [ 1078.191009] blkdev_ioctl+0x5cb/0x1a7e [ 1078.194903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.200253] ? blkpg_ioctl+0x9d0/0x9d0 [ 1078.204124] ? mark_held_locks+0xf0/0xf0 [ 1078.208183] ? mark_held_locks+0xf0/0xf0 [ 1078.212243] ? debug_check_no_obj_freed+0x201/0x482 [ 1078.217250] ? lock_downgrade+0x720/0x720 [ 1078.221388] block_ioctl+0xe9/0x130 [ 1078.225000] ? blkdev_fallocate+0x3f0/0x3f0 [ 1078.229325] do_vfs_ioctl+0xcdb/0x12e0 [ 1078.233256] ? lock_downgrade+0x720/0x720 [ 1078.237386] ? check_preemption_disabled+0x41/0x280 [ 1078.242431] ? ioctl_preallocate+0x200/0x200 [ 1078.246825] ? __fget+0x356/0x510 [ 1078.250263] ? do_dup2+0x450/0x450 [ 1078.253789] ? do_sys_open+0x2bf/0x520 [ 1078.257671] ksys_ioctl+0x9b/0xc0 [ 1078.261124] __x64_sys_ioctl+0x6f/0xb0 [ 1078.264994] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1078.269560] do_syscall_64+0xf9/0x620 [ 1078.273346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.278535] RIP: 0033:0x45dd27 [ 1078.281711] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.300599] RSP: 002b:00007fe4fe96aa28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.308289] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dd27 [ 1078.315547] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1078.322802] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 1078.330052] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 1078.337303] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000270 21:06:15 executing program 5 (fault-call:3 fault-nth:28): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1078.363719] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1078.386317] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1078.473754] FAULT_INJECTION: forcing a failure. [ 1078.473754] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.485445] CPU: 1 PID: 7569 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1078.493267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.502630] Call Trace: [ 1078.505240] dump_stack+0x1fc/0x2fe [ 1078.508886] should_fail.cold+0xa/0x14 [ 1078.512790] ? setup_fault_attr+0x200/0x200 [ 1078.517134] ? lock_acquire+0x170/0x3c0 [ 1078.521248] __should_failslab+0x115/0x180 [ 1078.525500] should_failslab+0x5/0xf [ 1078.529221] kmem_cache_alloc+0x277/0x370 [ 1078.533389] getname_flags+0xce/0x590 [ 1078.537204] do_mkdirat+0x8d/0x2d0 [ 1078.540761] ? __ia32_sys_mknod+0x120/0x120 [ 1078.545081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1078.550652] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1078.555673] ? do_syscall_64+0x21/0x620 [ 1078.559677] do_syscall_64+0xf9/0x620 [ 1078.563467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.568649] RIP: 0033:0x45d2d7 [ 1078.571846] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.590871] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1078.598603] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1078.605877] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1078.613132] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1078.620396] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1078.627646] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:17 executing program 5 (fault-call:3 fault-nth:29): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1079.922784] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1079.948207] FAULT_INJECTION: forcing a failure. [ 1079.948207] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.963827] CPU: 0 PID: 7586 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1079.971658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.981008] Call Trace: [ 1079.983586] dump_stack+0x1fc/0x2fe [ 1079.987325] should_fail.cold+0xa/0x14 [ 1079.995984] ? setup_fault_attr+0x200/0x200 [ 1080.000333] ? lock_acquire+0x170/0x3c0 [ 1080.004298] __should_failslab+0x115/0x180 [ 1080.008571] should_failslab+0x5/0xf [ 1080.012270] kmem_cache_alloc+0x277/0x370 [ 1080.016448] __d_alloc+0x2b/0xa10 [ 1080.019886] d_alloc+0x4a/0x230 [ 1080.023152] __lookup_hash+0xc8/0x180 [ 1080.027055] filename_create+0x186/0x490 [ 1080.031105] ? kern_path_mountpoint+0x40/0x40 [ 1080.035649] ? strncpy_from_user+0x2a2/0x350 [ 1080.040744] ? getname_flags+0x25b/0x590 [ 1080.044799] do_mkdirat+0xa0/0x2d0 [ 1080.048329] ? __ia32_sys_mknod+0x120/0x120 [ 1080.052640] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1080.057721] ? do_syscall_64+0x21/0x620 [ 1080.061681] do_syscall_64+0xf9/0x620 [ 1080.065516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.070687] RIP: 0033:0x45d2d7 [ 1080.074060] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1080.092948] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1080.100649] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1080.107939] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1080.115190] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1080.122462] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1080.129723] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x5901, 0x0) 21:06:17 executing program 5 (fault-call:3 fault-nth:30): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1080.422420] FAULT_INJECTION: forcing a failure. [ 1080.422420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1080.434283] CPU: 0 PID: 7600 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1080.442083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.451451] Call Trace: [ 1080.454167] dump_stack+0x1fc/0x2fe [ 1080.457812] should_fail.cold+0xa/0x14 [ 1080.461712] ? setup_fault_attr+0x200/0x200 [ 1080.466048] ? __mutex_unlock_slowpath+0xea/0x610 [ 1080.470906] __alloc_pages_nodemask+0x239/0x2890 [ 1080.475680] ? __lock_acquire+0x6de/0x3ff0 [ 1080.479929] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1080.484781] ? blkdev_ioctl+0x11a/0x1a7e [ 1080.488840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.494199] ? blkpg_ioctl+0x9d0/0x9d0 [ 1080.498082] ? debug_check_no_obj_freed+0x201/0x482 [ 1080.503084] ? lock_downgrade+0x720/0x720 [ 1080.507218] cache_grow_begin+0xa4/0x8a0 [ 1080.511263] ? setup_fault_attr+0x200/0x200 [ 1080.515575] ? lock_acquire+0x170/0x3c0 [ 1080.519541] cache_alloc_refill+0x273/0x340 [ 1080.523865] kmem_cache_alloc+0x346/0x370 [ 1080.528006] getname_flags+0xce/0x590 [ 1080.531793] do_mkdirat+0x8d/0x2d0 [ 1080.535361] ? __ia32_sys_mknod+0x120/0x120 [ 1080.539710] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1080.545057] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1080.550087] ? do_syscall_64+0x21/0x620 [ 1080.554060] do_syscall_64+0xf9/0x620 [ 1080.557859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.563047] RIP: 0033:0x45d2d7 [ 1080.566241] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1080.585153] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1080.592908] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1080.600165] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1080.607418] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1080.614670] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 21:06:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1080.621921] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:18 executing program 5 (fault-call:3 fault-nth:31): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1080.669975] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1080.753017] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1080.770563] FAULT_INJECTION: forcing a failure. [ 1080.770563] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.782394] CPU: 1 PID: 7630 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1080.790203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.802420] Call Trace: [ 1080.805019] dump_stack+0x1fc/0x2fe [ 1080.810087] should_fail.cold+0xa/0x14 [ 1080.813964] ? setup_fault_attr+0x200/0x200 [ 1080.818399] ? __es_tree_search.isra.0+0x1af/0x210 [ 1080.823377] __should_failslab+0x115/0x180 [ 1080.827614] should_failslab+0x5/0xf [ 1080.831348] kmem_cache_alloc+0x3f/0x370 [ 1080.835645] __es_insert_extent+0x39b/0x13b0 [ 1080.840051] ? lock_acquire+0x170/0x3c0 [ 1080.844009] ? ext4_es_insert_extent+0x17e/0x5e0 [ 1080.848821] ext4_es_insert_extent+0x22e/0x5e0 [ 1080.853488] ? lock_downgrade+0x720/0x720 [ 1080.857623] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1080.865948] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1080.870964] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 1080.877514] ext4_ext_map_blocks+0x2129/0x7390 [ 1080.883302] ? __lock_acquire+0x6de/0x3ff0 [ 1080.887543] ? __lock_acquire+0x6de/0x3ff0 [ 1080.891763] ? mark_held_locks+0xf0/0xf0 [ 1080.895826] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1080.901187] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1080.906385] ? mark_held_locks+0xf0/0xf0 [ 1080.910480] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 1080.915330] ? ext4_es_lookup_extent+0x375/0xb60 [ 1080.920090] ? check_preemption_disabled+0x41/0x280 [ 1080.925101] ? lock_acquire+0x170/0x3c0 [ 1080.929075] ? ext4_map_blocks+0x33e/0x1a50 [ 1080.933423] ext4_map_blocks+0xd88/0x1a50 [ 1080.937568] ? check_preemption_disabled+0x41/0x280 [ 1080.942567] ? ext4_issue_zeroout+0x160/0x160 [ 1080.947093] ? __brelse+0x84/0xa0 [ 1080.950547] ? __ext4_new_inode+0x2eb/0x5a20 [ 1080.954962] ext4_getblk+0xad/0x4f0 [ 1080.958584] ? ext4_iomap_begin+0xe00/0xe00 [ 1080.962890] ? ext4_free_inode+0x1780/0x1780 [ 1080.967282] ? debug_check_no_obj_freed+0x201/0x482 [ 1080.972358] ? __dquot_initialize+0x298/0xb70 [ 1080.976839] ext4_bread+0x7c/0x210 [ 1080.980362] ? ext4_getblk+0x4f0/0x4f0 [ 1080.984246] ? dquot_initialize_needed+0x290/0x290 [ 1080.989159] ? trace_hardirqs_off+0x64/0x200 [ 1080.993552] ext4_append+0x155/0x370 [ 1080.997268] ext4_mkdir+0x5bd/0xdc0 [ 1081.000882] ? ext4_init_dot_dotdot+0x600/0x600 [ 1081.005538] ? generic_permission+0x116/0x4d0 [ 1081.010019] ? inode_permission.part.0+0x10c/0x450 [ 1081.014942] vfs_mkdir+0x508/0x7a0 [ 1081.018468] do_mkdirat+0x262/0x2d0 [ 1081.022079] ? __ia32_sys_mknod+0x120/0x120 [ 1081.026384] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1081.031386] ? do_syscall_64+0x21/0x620 [ 1081.035343] do_syscall_64+0xf9/0x620 [ 1081.039129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.044322] RIP: 0033:0x45d2d7 [ 1081.047496] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.066392] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1081.074097] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1081.081369] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1081.088634] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1081.095899] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1081.103150] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1081.149012] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:18 executing program 5 (fault-call:3 fault-nth:32): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1081.195828] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1081.314491] FAULT_INJECTION: forcing a failure. [ 1081.314491] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.326857] CPU: 0 PID: 7645 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1081.334671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.344032] Call Trace: [ 1081.346659] dump_stack+0x1fc/0x2fe [ 1081.350301] should_fail.cold+0xa/0x14 [ 1081.354199] ? setup_fault_attr+0x200/0x200 [ 1081.358520] ? lock_downgrade+0x720/0x720 [ 1081.362662] __should_failslab+0x115/0x180 [ 1081.366902] should_failslab+0x5/0xf [ 1081.370601] __kmalloc+0x2ab/0x3c0 [ 1081.374125] ? ext4_find_extent+0x9bb/0xc70 [ 1081.378449] ext4_find_extent+0x9bb/0xc70 [ 1081.382587] ext4_ext_map_blocks+0x1c0/0x7390 [ 1081.387076] ? __lock_acquire+0x6de/0x3ff0 [ 1081.391300] ? mark_held_locks+0xf0/0xf0 [ 1081.395353] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1081.400703] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1081.405888] ? mark_held_locks+0xf0/0xf0 [ 1081.409941] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 1081.414773] ? ext4_es_lookup_extent+0x375/0xb60 [ 1081.419535] ? ext4_map_blocks+0x59f/0x1a50 [ 1081.423845] ? lock_acquire+0x170/0x3c0 [ 1081.427805] ? ext4_map_blocks+0x740/0x1a50 [ 1081.432124] ext4_map_blocks+0x7a2/0x1a50 [ 1081.436261] ? check_preemption_disabled+0x41/0x280 [ 1081.441264] ? ext4_issue_zeroout+0x160/0x160 [ 1081.445760] ? __brelse+0x84/0xa0 [ 1081.449199] ? __ext4_new_inode+0x2eb/0x5a20 [ 1081.453597] ext4_getblk+0xad/0x4f0 [ 1081.457212] ? ext4_iomap_begin+0xe00/0xe00 [ 1081.461524] ? ext4_free_inode+0x1780/0x1780 [ 1081.465917] ? debug_check_no_obj_freed+0x201/0x482 [ 1081.470920] ? __dquot_initialize+0x298/0xb70 [ 1081.475410] ext4_bread+0x7c/0x210 [ 1081.478948] ? ext4_getblk+0x4f0/0x4f0 [ 1081.482821] ? dquot_initialize_needed+0x290/0x290 [ 1081.487738] ? trace_hardirqs_off+0x64/0x200 [ 1081.492134] ext4_append+0x155/0x370 [ 1081.495835] ext4_mkdir+0x5bd/0xdc0 [ 1081.499451] ? ext4_init_dot_dotdot+0x600/0x600 [ 1081.504106] ? generic_permission+0x116/0x4d0 [ 1081.508605] ? inode_permission.part.0+0x10c/0x450 [ 1081.513523] vfs_mkdir+0x508/0x7a0 [ 1081.517049] do_mkdirat+0x262/0x2d0 [ 1081.520663] ? __ia32_sys_mknod+0x120/0x120 [ 1081.524976] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1081.530080] ? do_syscall_64+0x21/0x620 [ 1081.534039] do_syscall_64+0xf9/0x620 [ 1081.537828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.543086] RIP: 0033:0x45d2d7 [ 1081.546265] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.565236] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1081.572945] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1081.580227] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1081.587490] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1081.594752] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1081.602012] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1081.621124] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:20 executing program 5 (fault-call:3 fault-nth:33): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1082.977960] FAULT_INJECTION: forcing a failure. [ 1082.977960] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.994215] CPU: 0 PID: 7659 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1083.002065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.012201] Call Trace: [ 1083.014791] dump_stack+0x1fc/0x2fe [ 1083.018419] should_fail.cold+0xa/0x14 [ 1083.022296] ? setup_fault_attr+0x200/0x200 [ 1083.026605] ? lock_downgrade+0x720/0x720 [ 1083.030745] __should_failslab+0x115/0x180 [ 1083.034978] should_failslab+0x5/0xf [ 1083.038694] __kmalloc+0x2ab/0x3c0 [ 1083.042217] ? ext4_find_extent+0x9bb/0xc70 [ 1083.046527] ext4_find_extent+0x9bb/0xc70 [ 1083.050662] ext4_ext_map_blocks+0x1c0/0x7390 [ 1083.055149] ? __lock_acquire+0x6de/0x3ff0 [ 1083.059372] ? mark_held_locks+0xf0/0xf0 [ 1083.063417] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1083.068767] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1083.073940] ? mark_held_locks+0xf0/0xf0 [ 1083.077997] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 1083.082837] ? ext4_es_lookup_extent+0x375/0xb60 [ 1083.087581] ? ext4_map_blocks+0x59f/0x1a50 [ 1083.091888] ? lock_acquire+0x170/0x3c0 [ 1083.095847] ? ext4_map_blocks+0x740/0x1a50 [ 1083.100179] ext4_map_blocks+0x7a2/0x1a50 [ 1083.104314] ? check_preemption_disabled+0x41/0x280 [ 1083.109326] ? ext4_issue_zeroout+0x160/0x160 [ 1083.113811] ? __brelse+0x84/0xa0 [ 1083.117251] ? __ext4_new_inode+0x2eb/0x5a20 [ 1083.121651] ext4_getblk+0xad/0x4f0 [ 1083.125263] ? ext4_iomap_begin+0xe00/0xe00 [ 1083.129574] ? ext4_free_inode+0x1780/0x1780 [ 1083.133964] ? debug_check_no_obj_freed+0x201/0x482 [ 1083.138973] ? __dquot_initialize+0x298/0xb70 [ 1083.143459] ext4_bread+0x7c/0x210 [ 1083.146988] ? ext4_getblk+0x4f0/0x4f0 [ 1083.150860] ? dquot_initialize_needed+0x290/0x290 [ 1083.155777] ? trace_hardirqs_off+0x64/0x200 [ 1083.160174] ext4_append+0x155/0x370 [ 1083.163875] ext4_mkdir+0x5bd/0xdc0 [ 1083.167502] ? ext4_init_dot_dotdot+0x600/0x600 [ 1083.172161] ? generic_permission+0x116/0x4d0 [ 1083.176642] ? inode_permission.part.0+0x10c/0x450 [ 1083.181560] vfs_mkdir+0x508/0x7a0 [ 1083.185087] do_mkdirat+0x262/0x2d0 [ 1083.188704] ? __ia32_sys_mknod+0x120/0x120 [ 1083.193024] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1083.198027] ? do_syscall_64+0x21/0x620 [ 1083.201986] do_syscall_64+0xf9/0x620 [ 1083.205786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.210961] RIP: 0033:0x45d2d7 [ 1083.214142] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.233029] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1083.240721] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1083.247988] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1083.255242] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1083.262495] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1083.269752] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1083.312418] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 1083.321307] EXT4-fs (loop2): group descriptors corrupted! 21:06:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x60ff, 0x0) 21:06:20 executing program 5 (fault-call:3 fault-nth:34): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1083.452567] FAULT_INJECTION: forcing a failure. [ 1083.452567] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.465472] CPU: 1 PID: 7683 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1083.473297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.482653] Call Trace: [ 1083.485250] dump_stack+0x1fc/0x2fe [ 1083.488898] should_fail.cold+0xa/0x14 [ 1083.492798] ? setup_fault_attr+0x200/0x200 [ 1083.497121] ? lock_downgrade+0x720/0x720 [ 1083.501256] __should_failslab+0x115/0x180 [ 1083.505475] should_failslab+0x5/0xf [ 1083.509169] __kmalloc+0x2ab/0x3c0 [ 1083.512692] ? ext4_find_extent+0x9bb/0xc70 [ 1083.516996] ext4_find_extent+0x9bb/0xc70 [ 1083.521175] ext4_ext_map_blocks+0x1c0/0x7390 [ 1083.525702] ? __lock_acquire+0x6de/0x3ff0 [ 1083.529934] ? mark_held_locks+0xf0/0xf0 [ 1083.533991] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1083.539335] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1083.544506] ? mark_held_locks+0xf0/0xf0 [ 1083.548547] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 1083.553374] ? ext4_es_lookup_extent+0x375/0xb60 [ 1083.558114] ? ext4_map_blocks+0x59f/0x1a50 [ 1083.562437] ? lock_acquire+0x170/0x3c0 [ 1083.566404] ? ext4_map_blocks+0x740/0x1a50 [ 1083.570714] ext4_map_blocks+0x7a2/0x1a50 [ 1083.574850] ? check_preemption_disabled+0x41/0x280 [ 1083.579854] ? ext4_issue_zeroout+0x160/0x160 [ 1083.584335] ? __brelse+0x84/0xa0 [ 1083.587787] ? __ext4_new_inode+0x2eb/0x5a20 [ 1083.592182] ext4_getblk+0xad/0x4f0 [ 1083.595794] ? ext4_iomap_begin+0xe00/0xe00 [ 1083.600100] ? ext4_free_inode+0x1780/0x1780 [ 1083.604488] ? debug_check_no_obj_freed+0x201/0x482 [ 1083.609486] ? __dquot_initialize+0x298/0xb70 [ 1083.614012] ext4_bread+0x7c/0x210 [ 1083.617549] ? ext4_getblk+0x4f0/0x4f0 [ 1083.621421] ? dquot_initialize_needed+0x290/0x290 [ 1083.626334] ? trace_hardirqs_off+0x64/0x200 [ 1083.630726] ext4_append+0x155/0x370 [ 1083.634458] ext4_mkdir+0x5bd/0xdc0 [ 1083.638072] ? ext4_init_dot_dotdot+0x600/0x600 [ 1083.642722] ? generic_permission+0x116/0x4d0 [ 1083.647202] ? inode_permission.part.0+0x10c/0x450 [ 1083.652112] vfs_mkdir+0x508/0x7a0 [ 1083.655650] do_mkdirat+0x262/0x2d0 [ 1083.659263] ? __ia32_sys_mknod+0x120/0x120 [ 1083.663566] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1083.668666] ? do_syscall_64+0x21/0x620 [ 1083.672636] do_syscall_64+0xf9/0x620 [ 1083.676422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.681594] RIP: 0033:0x45d2d7 [ 1083.684774] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.703657] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1083.711368] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1083.718618] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1083.725881] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1083.733139] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1083.740400] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:21 executing program 5 (fault-call:3 fault-nth:35): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1083.881481] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 1083.893280] FAULT_INJECTION: forcing a failure. [ 1083.893280] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.905063] CPU: 0 PID: 7707 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1083.912874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.922235] Call Trace: [ 1083.924837] dump_stack+0x1fc/0x2fe [ 1083.928921] should_fail.cold+0xa/0x14 [ 1083.932933] ? setup_fault_attr+0x200/0x200 [ 1083.937270] ? lock_acquire+0x170/0x3c0 [ 1083.941258] __should_failslab+0x115/0x180 [ 1083.945500] should_failslab+0x5/0xf [ 1083.949223] __kmalloc_track_caller+0x2a6/0x3c0 [ 1083.953986] ? strndup_user+0x70/0x120 [ 1083.957886] ? _copy_from_user+0xd2/0x130 [ 1083.962040] memdup_user+0x22/0xb0 [ 1083.965591] strndup_user+0x70/0x120 [ 1083.969318] ksys_mount+0x6f/0x130 [ 1083.969786] EXT4-fs (loop2): group descriptors corrupted! 21:06:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1083.972865] __x64_sys_mount+0xba/0x150 [ 1083.972884] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1083.972900] do_syscall_64+0xf9/0x620 [ 1083.972918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.972933] RIP: 0033:0x46090a [ 1083.986258] ptrace attach of "/root/syz-executor.1"[7716] was attempted by "/root/syz-executor.1"[7717] [ 1083.987092] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 21:06:21 executing program 5 (fault-call:3 fault-nth:36): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1083.987101] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1083.987116] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1083.987126] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1083.987135] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1083.987142] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1083.987153] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1084.167920] FAULT_INJECTION: forcing a failure. [ 1084.167920] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.180614] CPU: 0 PID: 7726 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1084.188437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.198492] Call Trace: [ 1084.201093] dump_stack+0x1fc/0x2fe [ 1084.204734] should_fail.cold+0xa/0x14 [ 1084.208663] ? setup_fault_attr+0x200/0x200 [ 1084.212998] ? lock_downgrade+0x720/0x720 [ 1084.217153] ? check_preemption_disabled+0x41/0x280 [ 1084.222184] __should_failslab+0x115/0x180 [ 1084.226428] should_failslab+0x5/0xf [ 1084.230190] kmem_cache_alloc+0x277/0x370 [ 1084.234337] ext4_mb_new_blocks+0x60a/0x4370 [ 1084.238751] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1084.243760] ? ext4_cache_extents+0x68/0x2d0 [ 1084.248150] ? ext4_find_extent+0x9bb/0xc70 [ 1084.252468] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 1084.257744] ? ext4_ext_search_right+0x2c7/0xb60 [ 1084.262495] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 1084.267497] ext4_ext_map_blocks+0x2aa2/0x7390 [ 1084.272068] ? __lock_acquire+0x6de/0x3ff0 [ 1084.276424] ? mark_held_locks+0xf0/0xf0 [ 1084.280484] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1084.285833] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1084.291010] ? mark_held_locks+0xf0/0xf0 [ 1084.295070] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 1084.299934] ? ext4_es_lookup_extent+0x375/0xb60 [ 1084.304685] ? ext4_map_blocks+0x59f/0x1a50 [ 1084.309001] ext4_map_blocks+0x7a2/0x1a50 [ 1084.313133] ? check_preemption_disabled+0x41/0x280 [ 1084.318237] ? ext4_issue_zeroout+0x160/0x160 [ 1084.322732] ? __brelse+0x84/0xa0 [ 1084.326175] ? __ext4_new_inode+0x2eb/0x5a20 [ 1084.330582] ext4_getblk+0xad/0x4f0 [ 1084.334209] ? ext4_iomap_begin+0xe00/0xe00 [ 1084.338530] ? ext4_free_inode+0x1780/0x1780 [ 1084.343032] ? debug_check_no_obj_freed+0x201/0x482 [ 1084.348035] ? __dquot_initialize+0x298/0xb70 [ 1084.352518] ext4_bread+0x7c/0x210 [ 1084.356038] ? ext4_getblk+0x4f0/0x4f0 [ 1084.359920] ? dquot_initialize_needed+0x290/0x290 [ 1084.364843] ? trace_hardirqs_off+0x64/0x200 [ 1084.369527] ext4_append+0x155/0x370 [ 1084.373272] ext4_mkdir+0x5bd/0xdc0 [ 1084.376904] ? ext4_init_dot_dotdot+0x600/0x600 [ 1084.381566] ? generic_permission+0x116/0x4d0 [ 1084.386062] ? inode_permission.part.0+0x10c/0x450 [ 1084.390981] vfs_mkdir+0x508/0x7a0 [ 1084.394506] do_mkdirat+0x262/0x2d0 [ 1084.398131] ? __ia32_sys_mknod+0x120/0x120 [ 1084.402448] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1084.407451] ? do_syscall_64+0x21/0x620 [ 1084.411407] do_syscall_64+0xf9/0x620 [ 1084.415193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.420372] RIP: 0033:0x45d2d7 [ 1084.423565] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.442571] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1084.450263] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000045d2d7 [ 1084.457520] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 1084.464783] RBP: 00007fe4fe96aae0 R08: 0000000020000260 R09: 0000000000000000 [ 1084.472034] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 1084.479293] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d900", 0x2e, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1086.031966] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (20984!=0) [ 1086.041077] EXT4-fs (loop2): group descriptors corrupted! 21:06:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7500, 0x0) 21:06:23 executing program 5 (fault-call:3 fault-nth:37): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1086.488907] FAULT_INJECTION: forcing a failure. [ 1086.488907] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.512369] CPU: 1 PID: 7753 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1086.520198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.529545] Call Trace: [ 1086.532125] dump_stack+0x1fc/0x2fe [ 1086.535744] should_fail.cold+0xa/0x14 [ 1086.539614] ? setup_fault_attr+0x200/0x200 [ 1086.543918] ? lock_acquire+0x170/0x3c0 [ 1086.547884] __should_failslab+0x115/0x180 [ 1086.552100] should_failslab+0x5/0xf [ 1086.555804] __kmalloc_track_caller+0x2a6/0x3c0 [ 1086.560466] ? strndup_user+0x70/0x120 [ 1086.564449] memdup_user+0x22/0xb0 [ 1086.567980] strndup_user+0x70/0x120 [ 1086.571685] ksys_mount+0x34/0x130 [ 1086.575211] __x64_sys_mount+0xba/0x150 [ 1086.579170] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1086.583738] do_syscall_64+0xf9/0x620 [ 1086.587529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.592704] RIP: 0033:0x46090a [ 1086.595879] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1086.614771] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1086.622509] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1086.629790] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1086.637083] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1086.644349] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1086.651602] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:24 executing program 5 (fault-call:3 fault-nth:38): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1086.877114] FAULT_INJECTION: forcing a failure. [ 1086.877114] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.888734] CPU: 1 PID: 7768 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1086.896542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.905917] Call Trace: [ 1086.908525] dump_stack+0x1fc/0x2fe [ 1086.915207] should_fail.cold+0xa/0x14 [ 1086.919528] ? setup_fault_attr+0x200/0x200 [ 1086.923841] ? lock_acquire+0x170/0x3c0 [ 1086.927811] __should_failslab+0x115/0x180 [ 1086.932032] should_failslab+0x5/0xf [ 1086.935730] __kmalloc_track_caller+0x2a6/0x3c0 [ 1086.940470] ? strndup_user+0x70/0x120 [ 1086.944342] ? _copy_from_user+0xd2/0x130 [ 1086.948479] memdup_user+0x22/0xb0 [ 1086.952002] strndup_user+0x70/0x120 [ 1086.955700] ksys_mount+0x6f/0x130 [ 1086.959239] __x64_sys_mount+0xba/0x150 [ 1086.963201] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1086.967782] do_syscall_64+0xf9/0x620 [ 1086.972358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.977530] RIP: 0033:0x46090a [ 1086.980709] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1086.999596] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1087.007290] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1087.014545] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1087.021800] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1087.029931] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1087.037192] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1087.061247] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1087.070285] EXT4-fs (loop2): group descriptors corrupted! 21:06:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:24 executing program 5 (fault-call:3 fault-nth:39): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1087.178119] FAULT_INJECTION: forcing a failure. [ 1087.178119] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.191430] CPU: 0 PID: 7786 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1087.199247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.208612] Call Trace: [ 1087.211210] dump_stack+0x1fc/0x2fe [ 1087.214856] should_fail.cold+0xa/0x14 [ 1087.218754] ? setup_fault_attr+0x200/0x200 [ 1087.223205] ? lock_acquire+0x170/0x3c0 [ 1087.227209] __should_failslab+0x115/0x180 [ 1087.231451] should_failslab+0x5/0xf [ 1087.235172] __kmalloc_track_caller+0x2a6/0x3c0 [ 1087.239853] ? strndup_user+0x70/0x120 [ 1087.243746] ? _copy_from_user+0xd2/0x130 [ 1087.247901] memdup_user+0x22/0xb0 [ 1087.251451] strndup_user+0x70/0x120 [ 1087.255195] ksys_mount+0x6f/0x130 [ 1087.258749] __x64_sys_mount+0xba/0x150 [ 1087.262733] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1087.267325] do_syscall_64+0xf9/0x620 [ 1087.271129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.276307] RIP: 0033:0x46090a [ 1087.279487] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1087.299338] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1087.307045] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1087.314300] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 21:06:24 executing program 5 (fault-call:3 fault-nth:40): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1087.322163] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1087.329419] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1087.336685] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1087.370941] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1087.400221] EXT4-fs (loop2): group descriptors corrupted! [ 1087.444464] FAULT_INJECTION: forcing a failure. [ 1087.444464] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.471551] CPU: 0 PID: 7807 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1087.479508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.488873] Call Trace: 21:06:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000", 0x45, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1087.491477] dump_stack+0x1fc/0x2fe [ 1087.495120] should_fail.cold+0xa/0x14 [ 1087.499047] ? setup_fault_attr+0x200/0x200 [ 1087.503379] ? lock_acquire+0x170/0x3c0 [ 1087.507373] __should_failslab+0x115/0x180 [ 1087.511616] should_failslab+0x5/0xf [ 1087.515345] kmem_cache_alloc+0x277/0x370 [ 1087.519505] alloc_vfsmnt+0x23/0x780 [ 1087.523231] ? _raw_read_unlock+0x29/0x40 [ 1087.527392] vfs_kern_mount.part.0+0x27/0x470 [ 1087.531902] do_mount+0x113c/0x2f10 [ 1087.535545] ? lock_acquire+0x170/0x3c0 [ 1087.539528] ? check_preemption_disabled+0x41/0x280 [ 1087.544551] ? copy_mount_string+0x40/0x40 [ 1087.548794] ? copy_mount_options+0x59/0x380 [ 1087.553242] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1087.558277] ? kmem_cache_alloc_trace+0x323/0x380 [ 1087.563005] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1087.563132] ? copy_mount_options+0x26f/0x380 [ 1087.572185] EXT4-fs (loop2): group descriptors corrupted! [ 1087.576542] ksys_mount+0xcf/0x130 [ 1087.576564] __x64_sys_mount+0xba/0x150 [ 1087.576580] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1087.576592] do_syscall_64+0xf9/0x620 [ 1087.576609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.576620] RIP: 0033:0x46090a [ 1087.576634] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1087.576640] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1087.576654] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1087.576662] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1087.576670] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1087.576678] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1087.576686] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:26 executing program 5 (fault-call:3 fault-nth:41): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4", 0x1d}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1089.022347] FAULT_INJECTION: forcing a failure. [ 1089.022347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1089.034199] CPU: 0 PID: 7829 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1089.042000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.051361] Call Trace: [ 1089.053963] dump_stack+0x1fc/0x2fe [ 1089.057609] should_fail.cold+0xa/0x14 [ 1089.061515] ? setup_fault_attr+0x200/0x200 [ 1089.065866] __alloc_pages_nodemask+0x239/0x2890 [ 1089.070634] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 1089.076581] ? is_bpf_text_address+0xd5/0x1b0 [ 1089.081082] ? __lock_acquire+0x6de/0x3ff0 [ 1089.085305] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1089.090135] ? is_bpf_text_address+0xfc/0x1b0 [ 1089.094632] ? unwind_get_return_address+0x51/0x90 [ 1089.099545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.105010] ? __save_stack_trace+0xaf/0x190 [ 1089.109409] cache_grow_begin+0xa4/0x8a0 [ 1089.113460] ? setup_fault_attr+0x200/0x200 [ 1089.117768] ? lock_acquire+0x170/0x3c0 [ 1089.121828] cache_alloc_refill+0x273/0x340 [ 1089.126156] kmem_cache_alloc+0x346/0x370 [ 1089.130293] getname_flags+0xce/0x590 [ 1089.134213] user_path_at_empty+0x2a/0x50 [ 1089.138357] do_mount+0x147/0x2f10 [ 1089.141890] ? setup_fault_attr+0x200/0x200 [ 1089.146198] ? lock_acquire+0x170/0x3c0 [ 1089.150156] ? check_preemption_disabled+0x41/0x280 [ 1089.155158] ? copy_mount_string+0x40/0x40 [ 1089.159378] ? copy_mount_options+0x59/0x380 [ 1089.163773] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1089.168771] ? kmem_cache_alloc_trace+0x323/0x380 [ 1089.173604] ? copy_mount_options+0x26f/0x380 [ 1089.178085] ksys_mount+0xcf/0x130 [ 1089.181610] __x64_sys_mount+0xba/0x150 [ 1089.185565] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1089.190130] do_syscall_64+0xf9/0x620 [ 1089.193916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.199129] RIP: 0033:0x46090a [ 1089.202305] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1089.221273] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1089.228963] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1089.236229] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1089.243493] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1089.250747] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1089.258092] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1089.290008] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xf000, 0x0) 21:06:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1089.514280] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1089.523895] EXT4-fs (loop2): group descriptors corrupted! 21:06:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:27 executing program 5 (fault-call:3 fault-nth:42): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1089.903811] FAULT_INJECTION: forcing a failure. [ 1089.903811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1089.917051] CPU: 1 PID: 7865 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1089.924864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.934227] Call Trace: [ 1089.936829] dump_stack+0x1fc/0x2fe [ 1089.940481] should_fail.cold+0xa/0x14 [ 1089.944384] ? lock_acquire+0x170/0x3c0 [ 1089.948373] ? setup_fault_attr+0x200/0x200 [ 1089.952714] __alloc_pages_nodemask+0x239/0x2890 [ 1089.957475] ? pcpu_alloc+0x91f/0x1190 [ 1089.961388] ? mark_held_locks+0xf0/0xf0 [ 1089.965471] ? pcpu_alloc+0xe78/0x1190 [ 1089.969359] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1089.974204] ? check_preemption_disabled+0x41/0x280 [ 1089.979214] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1089.984217] ? pcpu_alloc+0xc9/0x1190 [ 1089.988007] alloc_pages_current+0x193/0x2a0 [ 1089.992401] ? __lockdep_init_map+0x100/0x5a0 [ 1089.996884] get_zeroed_page+0x10/0x40 [ 1090.000755] mount_fs+0x203/0x30c [ 1090.004201] vfs_kern_mount.part.0+0x68/0x470 [ 1090.008700] do_mount+0x113c/0x2f10 [ 1090.012323] ? lock_acquire+0x170/0x3c0 [ 1090.016283] ? check_preemption_disabled+0x41/0x280 [ 1090.021286] ? copy_mount_string+0x40/0x40 [ 1090.025522] ? copy_mount_options+0x59/0x380 [ 1090.029921] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1090.034934] ? kmem_cache_alloc_trace+0x323/0x380 [ 1090.040022] ? copy_mount_options+0x26f/0x380 [ 1090.044514] ksys_mount+0xcf/0x130 [ 1090.048043] __x64_sys_mount+0xba/0x150 [ 1090.052003] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1090.056584] do_syscall_64+0xf9/0x620 [ 1090.060384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.065555] RIP: 0033:0x46090a [ 1090.068735] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1090.087637] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1090.095331] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1090.102585] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1090.109838] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1090.117091] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1090.124344] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1090.139807] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) 21:06:27 executing program 5 (fault-call:3 fault-nth:43): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1090.150071] EXT4-fs (loop2): group descriptors corrupted! [ 1090.230715] FAULT_INJECTION: forcing a failure. [ 1090.230715] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.242880] CPU: 0 PID: 7882 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1090.250691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.260100] Call Trace: [ 1090.262701] dump_stack+0x1fc/0x2fe [ 1090.266344] should_fail.cold+0xa/0x14 [ 1090.270247] ? setup_fault_attr+0x200/0x200 [ 1090.274580] ? lock_acquire+0x170/0x3c0 21:06:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1090.278620] __should_failslab+0x115/0x180 [ 1090.282863] should_failslab+0x5/0xf [ 1090.286592] __kmalloc_track_caller+0x2a6/0x3c0 [ 1090.291264] ? kstrdup_const+0x53/0x80 [ 1090.295156] kstrdup+0x36/0x70 [ 1090.298349] kstrdup_const+0x53/0x80 [ 1090.302064] alloc_vfsmnt+0xb5/0x780 [ 1090.305787] ? _raw_read_unlock+0x29/0x40 [ 1090.309947] vfs_kern_mount.part.0+0x27/0x470 [ 1090.314454] do_mount+0x113c/0x2f10 [ 1090.318190] ? do_raw_spin_unlock+0x171/0x230 [ 1090.322698] ? check_preemption_disabled+0x41/0x280 [ 1090.329812] ? copy_mount_string+0x40/0x40 [ 1090.334150] ? copy_mount_options+0x59/0x380 [ 1090.339864] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1090.346086] ? kmem_cache_alloc_trace+0x323/0x380 [ 1090.350931] ? copy_mount_options+0x26f/0x380 [ 1090.355426] ksys_mount+0xcf/0x130 [ 1090.358955] __x64_sys_mount+0xba/0x150 [ 1090.362914] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1090.367568] do_syscall_64+0xf9/0x620 [ 1090.371374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.376546] RIP: 0033:0x46090a [ 1090.379760] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1090.398671] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1090.406448] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1090.413700] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1090.420949] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1090.428307] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1090.435676] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1090.466764] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) 21:06:27 executing program 5 (fault-call:3 fault-nth:44): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1090.477612] EXT4-fs (loop2): group descriptors corrupted! 21:06:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1090.559164] FAULT_INJECTION: forcing a failure. [ 1090.559164] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.570580] CPU: 0 PID: 7899 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1090.578383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.587747] Call Trace: [ 1090.590348] dump_stack+0x1fc/0x2fe [ 1090.593995] should_fail.cold+0xa/0x14 [ 1090.597904] ? setup_fault_attr+0x200/0x200 [ 1090.602240] ? lock_acquire+0x170/0x3c0 [ 1090.606234] __should_failslab+0x115/0x180 [ 1090.610483] should_failslab+0x5/0xf [ 1090.614208] kmem_cache_alloc+0x277/0x370 [ 1090.618368] alloc_vfsmnt+0x23/0x780 [ 1090.622087] ? _raw_read_unlock+0x29/0x40 [ 1090.626238] vfs_kern_mount.part.0+0x27/0x470 [ 1090.630920] do_mount+0x113c/0x2f10 [ 1090.634548] ? do_raw_spin_unlock+0x171/0x230 [ 1090.639035] ? check_preemption_disabled+0x41/0x280 [ 1090.644050] ? copy_mount_string+0x40/0x40 [ 1090.648277] ? copy_mount_options+0x59/0x380 [ 1090.656184] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1090.662069] ? kmem_cache_alloc_trace+0x323/0x380 [ 1090.666937] ? copy_mount_options+0x26f/0x380 [ 1090.671420] ksys_mount+0xcf/0x130 [ 1090.674948] __x64_sys_mount+0xba/0x150 [ 1090.678916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1090.684882] do_syscall_64+0xf9/0x620 [ 1090.688677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.693854] RIP: 0033:0x46090a [ 1090.697191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1090.716229] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1090.723935] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1090.731295] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1090.738564] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1090.745925] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1090.753217] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:28 executing program 5 (fault-call:3 fault-nth:45): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1090.837338] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1090.851993] EXT4-fs (loop2): group descriptors corrupted! [ 1090.871171] FAULT_INJECTION: forcing a failure. [ 1090.871171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1090.883012] CPU: 1 PID: 7911 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1090.890796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.900137] Call Trace: [ 1090.902885] dump_stack+0x1fc/0x2fe [ 1090.906513] should_fail.cold+0xa/0x14 [ 1090.910498] ? setup_fault_attr+0x200/0x200 [ 1090.914811] ? get_page_from_freelist+0x1d60/0x4170 [ 1090.919813] ? bad_range+0x260/0x3c0 [ 1090.923547] __alloc_pages_nodemask+0x239/0x2890 [ 1090.928287] ? kernel_poison_pages+0x2c/0x2a0 [ 1090.932852] ? get_page_from_freelist+0x1d01/0x4170 [ 1090.937851] ? preempt_count_add+0xaf/0x190 [ 1090.942158] ? __lock_acquire+0x6de/0x3ff0 [ 1090.946381] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1090.951206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.956573] ? should_fail+0x142/0x7b0 [ 1090.960466] ? lock_acquire+0x170/0x3c0 [ 1090.964428] ? check_preemption_disabled+0x41/0x280 [ 1090.969441] cache_grow_begin+0xa4/0x8a0 [ 1090.973487] ? setup_fault_attr+0x200/0x200 [ 1090.977806] ? lock_acquire+0x170/0x3c0 [ 1090.981779] cache_alloc_refill+0x273/0x340 [ 1090.986095] kmem_cache_alloc+0x346/0x370 [ 1090.990235] getname_kernel+0x4e/0x370 [ 1090.994107] kern_path+0x1b/0x40 [ 1090.997485] lookup_bdev+0xfc/0x220 [ 1091.001096] ? bd_acquire+0x440/0x440 [ 1091.004882] blkdev_get_by_path+0x1b/0xd0 [ 1091.009027] mount_bdev+0x5b/0x3b0 [ 1091.012632] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1091.017736] mount_fs+0xa3/0x30c [ 1091.021103] vfs_kern_mount.part.0+0x68/0x470 [ 1091.025609] do_mount+0x113c/0x2f10 [ 1091.029236] ? do_raw_spin_unlock+0x171/0x230 [ 1091.033711] ? check_preemption_disabled+0x41/0x280 [ 1091.038713] ? copy_mount_string+0x40/0x40 [ 1091.042939] ? copy_mount_options+0x59/0x380 [ 1091.047357] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1091.052366] ? kmem_cache_alloc_trace+0x323/0x380 [ 1091.057193] ? copy_mount_options+0x26f/0x380 [ 1091.061695] ksys_mount+0xcf/0x130 [ 1091.065316] __x64_sys_mount+0xba/0x150 [ 1091.069710] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1091.074379] do_syscall_64+0xf9/0x620 [ 1091.078164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.083337] RIP: 0033:0x46090a [ 1091.086512] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1091.105421] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1091.113127] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1091.120395] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1091.127647] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1091.134903] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1091.142154] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1091.183373] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:29 executing program 5 (fault-call:3 fault-nth:46): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1092.074166] FAULT_INJECTION: forcing a failure. [ 1092.074166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1092.086294] CPU: 1 PID: 7928 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1092.094106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.103466] Call Trace: [ 1092.106069] dump_stack+0x1fc/0x2fe [ 1092.109712] should_fail.cold+0xa/0x14 [ 1092.113615] ? lock_acquire+0x170/0x3c0 [ 1092.117602] ? setup_fault_attr+0x200/0x200 [ 1092.121942] __alloc_pages_nodemask+0x239/0x2890 [ 1092.126695] ? pcpu_alloc+0x91f/0x1190 [ 1092.130568] ? mark_held_locks+0xf0/0xf0 [ 1092.134616] ? pcpu_alloc+0xe78/0x1190 [ 1092.138510] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1092.143352] ? check_preemption_disabled+0x41/0x280 [ 1092.148356] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1092.153359] ? pcpu_alloc+0xc9/0x1190 [ 1092.157161] alloc_pages_current+0x193/0x2a0 [ 1092.162538] ? __lockdep_init_map+0x100/0x5a0 [ 1092.168001] get_zeroed_page+0x10/0x40 [ 1092.171888] mount_fs+0x203/0x30c [ 1092.175343] vfs_kern_mount.part.0+0x68/0x470 [ 1092.179849] do_mount+0x113c/0x2f10 [ 1092.183515] ? do_raw_spin_unlock+0x171/0x230 [ 1092.187995] ? check_preemption_disabled+0x41/0x280 [ 1092.193002] ? copy_mount_string+0x40/0x40 [ 1092.197668] ? copy_mount_options+0x59/0x380 [ 1092.202082] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1092.207087] ? kmem_cache_alloc_trace+0x323/0x380 [ 1092.211935] ? copy_mount_options+0x26f/0x380 [ 1092.216429] ksys_mount+0xcf/0x130 [ 1092.219977] __x64_sys_mount+0xba/0x150 [ 1092.223945] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1092.228513] do_syscall_64+0xf9/0x620 [ 1092.232919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.238210] RIP: 0033:0x46090a [ 1092.241395] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1092.260637] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1092.268335] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1092.275605] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1092.282871] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1092.290133] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1092.297402] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x400000, 0x0) 21:06:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1092.544558] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1092.554227] EXT4-fs (loop2): group descriptors corrupted! 21:06:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4", 0x1d}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:30 executing program 5 (fault-call:3 fault-nth:47): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/87, 0x57, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1092.949612] FAULT_INJECTION: forcing a failure. [ 1092.949612] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.961636] CPU: 0 PID: 7965 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1092.969452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.978814] Call Trace: [ 1092.981418] dump_stack+0x1fc/0x2fe [ 1092.985066] should_fail.cold+0xa/0x14 [ 1092.988971] ? setup_fault_attr+0x200/0x200 [ 1092.993300] ? lock_acquire+0x170/0x3c0 [ 1092.997291] __should_failslab+0x115/0x180 [ 1092.998295] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 1093.001539] should_failslab+0x5/0xf [ 1093.014139] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1093.015767] EXT4-fs (loop2): group descriptors corrupted! [ 1093.019255] __kmalloc_node+0x38/0x70 [ 1093.019271] kvmalloc_node+0x61/0xf0 [ 1093.019291] __list_lru_init+0x4c6/0x7f0 [ 1093.019306] ? up_read+0x73/0x110 [ 1093.019323] sget_userns+0x7e2/0xcd0 [ 1093.019340] ? set_bdev_super+0x110/0x110 [ 1093.047726] ? ns_test_super+0x50/0x50 [ 1093.052217] ? set_bdev_super+0x110/0x110 [ 1093.056354] ? ns_test_super+0x50/0x50 [ 1093.060261] sget+0x102/0x140 [ 1093.063354] mount_bdev+0xf8/0x3b0 [ 1093.066894] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1093.072008] mount_fs+0xa3/0x30c [ 1093.075389] vfs_kern_mount.part.0+0x68/0x470 [ 1093.079905] do_mount+0x113c/0x2f10 [ 1093.083533] ? lock_acquire+0x170/0x3c0 [ 1093.087506] ? check_preemption_disabled+0x41/0x280 [ 1093.092521] ? copy_mount_string+0x40/0x40 [ 1093.096751] ? copy_mount_options+0x59/0x380 [ 1093.101166] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1093.106179] ? kmem_cache_alloc_trace+0x323/0x380 [ 1093.111017] ? copy_mount_options+0x26f/0x380 [ 1093.115498] ksys_mount+0xcf/0x130 [ 1093.119109] __x64_sys_mount+0xba/0x150 [ 1093.123079] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1093.127660] do_syscall_64+0xf9/0x620 [ 1093.131493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.136680] RIP: 0033:0x46090a [ 1093.139866] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1093.158780] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1093.166495] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1093.173757] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1093.181020] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1093.188288] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1093.195557] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:30 executing program 5 (fault-call:3 fault-nth:48): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1093.315322] FAULT_INJECTION: forcing a failure. [ 1093.315322] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.344070] CPU: 1 PID: 7977 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1093.351936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.361297] Call Trace: [ 1093.364023] dump_stack+0x1fc/0x2fe [ 1093.367665] should_fail.cold+0xa/0x14 [ 1093.369462] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 1093.371593] ? setup_fault_attr+0x200/0x200 [ 1093.371607] ? lock_acquire+0x170/0x3c0 [ 1093.371628] __should_failslab+0x115/0x180 [ 1093.381709] EXT4-fs (loop2): group descriptors corrupted! [ 1093.385909] should_failslab+0x5/0xf [ 1093.385925] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1093.385940] __kmalloc_node+0x38/0x70 [ 1093.385954] kvmalloc_node+0x61/0xf0 [ 1093.385970] __list_lru_init+0x4c6/0x7f0 [ 1093.385987] ? up_read+0x73/0x110 [ 1093.423384] sget_userns+0x7e2/0xcd0 [ 1093.427081] ? set_bdev_super+0x110/0x110 [ 1093.431213] ? ns_test_super+0x50/0x50 [ 1093.435083] ? set_bdev_super+0x110/0x110 [ 1093.439223] ? ns_test_super+0x50/0x50 [ 1093.443708] sget+0x102/0x140 [ 1093.446811] mount_bdev+0xf8/0x3b0 [ 1093.450360] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1093.455455] mount_fs+0xa3/0x30c [ 1093.458808] vfs_kern_mount.part.0+0x68/0x470 [ 1093.463298] do_mount+0x113c/0x2f10 [ 1093.466911] ? lock_acquire+0x170/0x3c0 [ 1093.470886] ? check_preemption_disabled+0x41/0x280 [ 1093.475895] ? copy_mount_string+0x40/0x40 [ 1093.480110] ? copy_mount_options+0x59/0x380 [ 1093.484501] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1093.489509] ? kmem_cache_alloc_trace+0x323/0x380 [ 1093.494346] ? copy_mount_options+0x26f/0x380 [ 1093.498854] ksys_mount+0xcf/0x130 [ 1093.502377] __x64_sys_mount+0xba/0x150 [ 1093.506346] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1093.510945] do_syscall_64+0xf9/0x620 [ 1093.514760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.519931] RIP: 0033:0x46090a [ 1093.523105] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1093.542005] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1093.549698] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1093.556951] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1093.564210] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1093.571466] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1093.578733] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:31 executing program 5 (fault-call:3 fault-nth:49): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1093.689752] FAULT_INJECTION: forcing a failure. [ 1093.689752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1093.702496] CPU: 0 PID: 7993 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1093.710303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.719690] Call Trace: [ 1093.722293] dump_stack+0x1fc/0x2fe [ 1093.725941] should_fail.cold+0xa/0x14 [ 1093.729851] ? setup_fault_attr+0x200/0x200 [ 1093.734307] ? mark_held_locks+0xf0/0xf0 21:06:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1093.738385] __alloc_pages_nodemask+0x239/0x2890 [ 1093.743156] ? __lock_acquire+0x6de/0x3ff0 [ 1093.747403] ? __lock_acquire+0x6de/0x3ff0 [ 1093.751651] ? __lock_acquire+0x6de/0x3ff0 [ 1093.755902] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1093.760756] ? mark_held_locks+0xf0/0xf0 [ 1093.764836] ? mark_held_locks+0xf0/0xf0 [ 1093.768900] ? lock_downgrade+0x720/0x720 [ 1093.773055] ? blkdev_get+0x4ce/0x940 [ 1093.776873] cache_grow_begin+0xa4/0x8a0 [ 1093.780942] ? setup_fault_attr+0x200/0x200 [ 1093.785273] ? lock_acquire+0x170/0x3c0 [ 1093.789260] cache_alloc_refill+0x273/0x340 [ 1093.792250] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 1093.793590] kmem_cache_alloc_trace+0x354/0x380 [ 1093.793622] ? set_bdev_super+0x110/0x110 [ 1093.793634] ? ns_test_super+0x50/0x50 [ 1093.793650] sget_userns+0x122/0xcd0 [ 1093.802699] EXT4-fs (loop2): group descriptors corrupted! [ 1093.807171] ? set_bdev_super+0x110/0x110 [ 1093.807192] ? ns_test_super+0x50/0x50 [ 1093.807209] ? set_bdev_super+0x110/0x110 [ 1093.807222] ? ns_test_super+0x50/0x50 [ 1093.807234] sget+0x102/0x140 [ 1093.807251] mount_bdev+0xf8/0x3b0 [ 1093.807267] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1093.807286] mount_fs+0xa3/0x30c [ 1093.856135] vfs_kern_mount.part.0+0x68/0x470 [ 1093.861797] do_mount+0x113c/0x2f10 [ 1093.865417] ? do_raw_spin_unlock+0x171/0x230 [ 1093.869895] ? check_preemption_disabled+0x41/0x280 [ 1093.874893] ? copy_mount_string+0x40/0x40 [ 1093.879111] ? copy_mount_options+0x59/0x380 [ 1093.884496] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1093.889509] ? kmem_cache_alloc_trace+0x323/0x380 [ 1093.894336] ? copy_mount_options+0x26f/0x380 [ 1093.898819] ksys_mount+0xcf/0x130 [ 1093.902358] __x64_sys_mount+0xba/0x150 [ 1093.906431] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1093.911023] do_syscall_64+0xf9/0x620 [ 1093.914828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.920002] RIP: 0033:0x46090a [ 1093.923177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1093.943019] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1093.950730] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1093.957994] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1093.965266] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1093.972530] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1093.979809] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1093.996656] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:32 executing program 5 (fault-call:3 fault-nth:50): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1095.090077] FAULT_INJECTION: forcing a failure. [ 1095.090077] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.101825] CPU: 0 PID: 8012 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1095.109633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.119427] Call Trace: [ 1095.122043] dump_stack+0x1fc/0x2fe [ 1095.125691] should_fail.cold+0xa/0x14 [ 1095.129593] ? setup_fault_attr+0x200/0x200 [ 1095.133915] ? lock_acquire+0x170/0x3c0 [ 1095.137878] __should_failslab+0x115/0x180 [ 1095.142109] should_failslab+0x5/0xf [ 1095.145813] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1095.151035] __kmalloc_node+0x38/0x70 [ 1095.154835] kvmalloc_node+0x61/0xf0 [ 1095.158543] __list_lru_init+0x4c6/0x7f0 [ 1095.162591] ? up_read+0x73/0x110 [ 1095.166040] sget_userns+0x7e2/0xcd0 [ 1095.169736] ? set_bdev_super+0x110/0x110 [ 1095.173915] ? ns_test_super+0x50/0x50 [ 1095.177790] ? set_bdev_super+0x110/0x110 [ 1095.181921] ? ns_test_super+0x50/0x50 [ 1095.185792] sget+0x102/0x140 [ 1095.188890] mount_bdev+0xf8/0x3b0 [ 1095.192416] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1095.197502] mount_fs+0xa3/0x30c [ 1095.200854] vfs_kern_mount.part.0+0x68/0x470 [ 1095.205338] do_mount+0x113c/0x2f10 [ 1095.208961] ? lock_acquire+0x170/0x3c0 [ 1095.212929] ? check_preemption_disabled+0x41/0x280 [ 1095.217936] ? copy_mount_string+0x40/0x40 [ 1095.222164] ? copy_mount_options+0x59/0x380 [ 1095.226556] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1095.231556] ? kmem_cache_alloc_trace+0x323/0x380 [ 1095.236382] ? copy_mount_options+0x26f/0x380 [ 1095.240865] ksys_mount+0xcf/0x130 [ 1095.244399] __x64_sys_mount+0xba/0x150 [ 1095.248366] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1095.252944] do_syscall_64+0xf9/0x620 [ 1095.256727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1095.261898] RIP: 0033:0x46090a [ 1095.265093] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1095.283975] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1095.291665] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1095.298917] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1095.306181] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1095.313430] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1095.320682] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x548000, 0x0) 21:06:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef0000000000000000000000000000000000000000000000006578", 0x5a, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1095.541437] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (35133!=61414) [ 1095.550926] EXT4-fs (loop2): group descriptors corrupted! 21:06:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4", 0x1d}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:33 executing program 5 (fault-call:3 fault-nth:51): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1095.969286] FAULT_INJECTION: forcing a failure. [ 1095.969286] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.987817] CPU: 0 PID: 8045 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1095.995648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.005014] Call Trace: [ 1096.007614] dump_stack+0x1fc/0x2fe [ 1096.011265] should_fail.cold+0xa/0x14 [ 1096.015176] ? setup_fault_attr+0x200/0x200 [ 1096.019631] ? lock_acquire+0x170/0x3c0 [ 1096.023620] __should_failslab+0x115/0x180 [ 1096.027847] should_failslab+0x5/0xf [ 1096.031545] __kmalloc+0x2ab/0x3c0 [ 1096.035074] ? __list_lru_init+0xd3/0x7f0 [ 1096.039209] __list_lru_init+0xd3/0x7f0 [ 1096.043169] ? up_read+0x73/0x110 [ 1096.046612] sget_userns+0x810/0xcd0 [ 1096.050308] ? set_bdev_super+0x110/0x110 [ 1096.054444] ? ns_test_super+0x50/0x50 [ 1096.058329] ? set_bdev_super+0x110/0x110 [ 1096.062462] ? ns_test_super+0x50/0x50 [ 1096.066345] sget+0x102/0x140 [ 1096.069439] mount_bdev+0xf8/0x3b0 [ 1096.072966] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1096.078579] mount_fs+0xa3/0x30c [ 1096.081935] vfs_kern_mount.part.0+0x68/0x470 [ 1096.086421] do_mount+0x113c/0x2f10 [ 1096.090035] ? do_raw_spin_unlock+0x171/0x230 [ 1096.094526] ? check_preemption_disabled+0x41/0x280 [ 1096.099534] ? copy_mount_string+0x40/0x40 [ 1096.103754] ? copy_mount_options+0x59/0x380 [ 1096.108241] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1096.113242] ? kmem_cache_alloc_trace+0x323/0x380 [ 1096.118096] ? copy_mount_options+0x26f/0x380 [ 1096.122578] ksys_mount+0xcf/0x130 [ 1096.126106] __x64_sys_mount+0xba/0x150 [ 1096.130065] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1096.134628] do_syscall_64+0xf9/0x620 [ 1096.138423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.143597] RIP: 0033:0x46090a [ 1096.146776] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 21:06:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647", 0x2c}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1096.165671] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1096.173363] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1096.180617] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1096.187956] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1096.195214] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1096.202640] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:33 executing program 5 (fault-call:3 fault-nth:52): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1096.237671] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1096.246617] EXT4-fs (loop2): group descriptors corrupted! [ 1096.336482] FAULT_INJECTION: forcing a failure. [ 1096.336482] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.354638] CPU: 0 PID: 8068 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1096.365163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.374520] Call Trace: [ 1096.377115] dump_stack+0x1fc/0x2fe [ 1096.380763] should_fail.cold+0xa/0x14 [ 1096.384660] ? setup_fault_attr+0x200/0x200 [ 1096.388989] ? lock_acquire+0x170/0x3c0 [ 1096.392990] __should_failslab+0x115/0x180 [ 1096.397235] should_failslab+0x5/0xf [ 1096.400956] __kmalloc+0x2ab/0x3c0 [ 1096.404507] ? __list_lru_init+0xd3/0x7f0 [ 1096.408666] __list_lru_init+0xd3/0x7f0 [ 1096.412646] ? up_read+0x73/0x110 [ 1096.416114] sget_userns+0x810/0xcd0 [ 1096.419823] ? set_bdev_super+0x110/0x110 [ 1096.423970] ? ns_test_super+0x50/0x50 [ 1096.427870] ? set_bdev_super+0x110/0x110 [ 1096.432026] ? ns_test_super+0x50/0x50 21:06:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1096.435921] sget+0x102/0x140 [ 1096.439033] mount_bdev+0xf8/0x3b0 [ 1096.442582] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1096.447811] mount_fs+0xa3/0x30c [ 1096.450168] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1096.451186] vfs_kern_mount.part.0+0x68/0x470 [ 1096.451208] do_mount+0x113c/0x2f10 [ 1096.451224] ? lock_acquire+0x170/0x3c0 [ 1096.451241] ? check_preemption_disabled+0x41/0x280 [ 1096.466870] EXT4-fs (loop2): group descriptors corrupted! [ 1096.468972] ? copy_mount_string+0x40/0x40 [ 1096.468989] ? copy_mount_options+0x59/0x380 [ 1096.469006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1096.469023] ? kmem_cache_alloc_trace+0x323/0x380 [ 1096.502045] ? copy_mount_options+0x26f/0x380 [ 1096.506532] ksys_mount+0xcf/0x130 [ 1096.510057] __x64_sys_mount+0xba/0x150 [ 1096.514042] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1096.518610] do_syscall_64+0xf9/0x620 [ 1096.522395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.527577] RIP: 0033:0x46090a [ 1096.530763] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1096.549680] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1096.557389] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1096.564671] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1096.571940] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1096.579202] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1096.586466] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:34 executing program 5 (fault-call:3 fault-nth:53): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1096.716271] FAULT_INJECTION: forcing a failure. [ 1096.716271] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.757863] CPU: 0 PID: 8085 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1096.765811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.775160] Call Trace: [ 1096.777750] dump_stack+0x1fc/0x2fe [ 1096.781410] should_fail.cold+0xa/0x14 [ 1096.785283] ? setup_fault_attr+0x200/0x200 [ 1096.789600] ? lock_acquire+0x170/0x3c0 [ 1096.793608] __should_failslab+0x115/0x180 [ 1096.797829] should_failslab+0x5/0xf [ 1096.801526] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1096.806614] __kmalloc_node+0x38/0x70 [ 1096.810397] kvmalloc_node+0x61/0xf0 [ 1096.814097] __list_lru_init+0x4c6/0x7f0 [ 1096.818139] ? up_read+0x73/0x110 [ 1096.821577] sget_userns+0x810/0xcd0 [ 1096.825272] ? set_bdev_super+0x110/0x110 [ 1096.829403] ? ns_test_super+0x50/0x50 [ 1096.833327] ? set_bdev_super+0x110/0x110 [ 1096.837457] ? ns_test_super+0x50/0x50 [ 1096.841326] sget+0x102/0x140 [ 1096.844415] mount_bdev+0xf8/0x3b0 [ 1096.847977] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1096.853064] mount_fs+0xa3/0x30c [ 1096.856462] vfs_kern_mount.part.0+0x68/0x470 [ 1096.860942] do_mount+0x113c/0x2f10 [ 1096.864551] ? lock_acquire+0x170/0x3c0 [ 1096.868517] ? check_preemption_disabled+0x41/0x280 [ 1096.873532] ? copy_mount_string+0x40/0x40 [ 1096.877792] ? copy_mount_options+0x59/0x380 [ 1096.882187] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1096.887187] ? kmem_cache_alloc_trace+0x323/0x380 [ 1096.892013] ? copy_mount_options+0x26f/0x380 [ 1096.896544] ksys_mount+0xcf/0x130 [ 1096.900065] __x64_sys_mount+0xba/0x150 [ 1096.904037] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1096.908618] do_syscall_64+0xf9/0x620 [ 1096.912407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1096.917594] RIP: 0033:0x46090a [ 1096.920778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1096.939680] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1096.947388] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1096.954649] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1096.961908] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1096.969161] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1096.976410] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789e", 0x5b, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1098.118389] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (33150!=61414) [ 1098.127858] EXT4-fs (loop2): group descriptors corrupted! 21:06:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x707400, 0x0) 21:06:35 executing program 5 (fault-call:3 fault-nth:54): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1098.603690] FAULT_INJECTION: forcing a failure. [ 1098.603690] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.615408] CPU: 0 PID: 8121 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1098.623220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.632588] Call Trace: [ 1098.635191] dump_stack+0x1fc/0x2fe [ 1098.638831] should_fail.cold+0xa/0x14 [ 1098.642717] ? setup_fault_attr+0x200/0x200 [ 1098.647049] ? lock_acquire+0x170/0x3c0 [ 1098.651014] __should_failslab+0x115/0x180 [ 1098.655246] should_failslab+0x5/0xf [ 1098.658960] __kmalloc+0x2ab/0x3c0 [ 1098.662491] ? __list_lru_init+0xd3/0x7f0 [ 1098.666624] __list_lru_init+0xd3/0x7f0 [ 1098.670586] ? up_read+0x73/0x110 [ 1098.674112] sget_userns+0x810/0xcd0 [ 1098.677819] ? set_bdev_super+0x110/0x110 [ 1098.681963] ? ns_test_super+0x50/0x50 [ 1098.685835] ? set_bdev_super+0x110/0x110 [ 1098.689971] ? ns_test_super+0x50/0x50 [ 1098.693852] sget+0x102/0x140 [ 1098.696959] mount_bdev+0xf8/0x3b0 [ 1098.700522] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1098.705611] mount_fs+0xa3/0x30c [ 1098.708964] vfs_kern_mount.part.0+0x68/0x470 [ 1098.713487] do_mount+0x113c/0x2f10 [ 1098.717116] ? do_raw_spin_unlock+0x171/0x230 [ 1098.721607] ? check_preemption_disabled+0x41/0x280 [ 1098.726607] ? copy_mount_string+0x40/0x40 [ 1098.730911] ? copy_mount_options+0x59/0x380 [ 1098.735317] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1098.740325] ? kmem_cache_alloc_trace+0x323/0x380 [ 1098.745153] ? copy_mount_options+0x26f/0x380 [ 1098.749653] ksys_mount+0xcf/0x130 [ 1098.753281] __x64_sys_mount+0xba/0x150 [ 1098.757272] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1098.762004] do_syscall_64+0xf9/0x620 [ 1098.766489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.771708] RIP: 0033:0x46090a [ 1098.774902] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1098.793940] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1098.801633] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1098.808886] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1098.816170] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1098.823481] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1098.830733] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d4", 0x1a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:36 executing program 5 (fault-call:3 fault-nth:55): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1098.985094] FAULT_INJECTION: forcing a failure. [ 1098.985094] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.991532] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1098.996762] CPU: 0 PID: 8140 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1099.013844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.023202] Call Trace: [ 1099.025808] dump_stack+0x1fc/0x2fe [ 1099.029452] should_fail.cold+0xa/0x14 [ 1099.033355] ? setup_fault_attr+0x200/0x200 [ 1099.037676] ? lock_acquire+0x170/0x3c0 [ 1099.041657] __should_failslab+0x115/0x180 [ 1099.045903] should_failslab+0x5/0xf [ 1099.049706] __kmalloc+0x2ab/0x3c0 [ 1099.053251] ? __list_lru_init+0xd3/0x7f0 [ 1099.057411] __list_lru_init+0xd3/0x7f0 [ 1099.061385] ? up_read+0x73/0x110 [ 1099.064838] sget_userns+0x810/0xcd0 [ 1099.068554] ? set_bdev_super+0x110/0x110 [ 1099.072696] ? ns_test_super+0x50/0x50 [ 1099.076574] ? set_bdev_super+0x110/0x110 [ 1099.080704] ? ns_test_super+0x50/0x50 [ 1099.084582] sget+0x102/0x140 [ 1099.087695] mount_bdev+0xf8/0x3b0 [ 1099.091242] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1099.096343] mount_fs+0xa3/0x30c [ 1099.099697] vfs_kern_mount.part.0+0x68/0x470 [ 1099.104181] do_mount+0x113c/0x2f10 [ 1099.107809] ? do_raw_spin_unlock+0x171/0x230 [ 1099.112307] ? check_preemption_disabled+0x41/0x280 [ 1099.117320] ? copy_mount_string+0x40/0x40 [ 1099.121538] ? copy_mount_options+0x59/0x380 [ 1099.125945] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1099.130977] ? kmem_cache_alloc_trace+0x323/0x380 [ 1099.135820] ? copy_mount_options+0x26f/0x380 [ 1099.140319] ksys_mount+0xcf/0x130 [ 1099.143887] __x64_sys_mount+0xba/0x150 [ 1099.147869] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.152467] do_syscall_64+0xf9/0x620 [ 1099.156287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.161481] RIP: 0033:0x46090a [ 1099.164679] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1099.183579] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1099.191283] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1099.198561] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1099.208775] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1099.216038] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1099.223292] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:36 executing program 5 (fault-call:3 fault-nth:56): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647", 0x2c}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1099.349203] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1099.358715] FAULT_INJECTION: forcing a failure. [ 1099.358715] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.358735] CPU: 1 PID: 8165 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1099.358742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.358747] Call Trace: [ 1099.358767] dump_stack+0x1fc/0x2fe [ 1099.358789] should_fail.cold+0xa/0x14 [ 1099.358807] ? setup_fault_attr+0x200/0x200 [ 1099.358821] ? lock_acquire+0x170/0x3c0 [ 1099.358843] __should_failslab+0x115/0x180 [ 1099.358864] should_failslab+0x5/0xf [ 1099.414257] __kmalloc_track_caller+0x2a6/0x3c0 [ 1099.418915] ? ext4_fill_super+0xda/0xc820 [ 1099.423138] kstrdup+0x36/0x70 [ 1099.426333] ext4_fill_super+0xda/0xc820 [ 1099.430396] ? enable_ptr_key_workfn+0x30/0x30 [ 1099.435233] ? vsnprintf+0x2cc/0x14f0 [ 1099.439022] ? pointer+0x850/0x850 [ 1099.442549] ? lock_downgrade+0x720/0x720 [ 1099.446683] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1099.451770] ? snprintf+0xbb/0xf0 [ 1099.455213] ? vsprintf+0x30/0x30 [ 1099.458654] ? wait_for_completion_io+0x10/0x10 [ 1099.463307] ? set_blocksize+0x163/0x3f0 [ 1099.467361] mount_bdev+0x2fc/0x3b0 [ 1099.470983] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1099.476081] mount_fs+0xa3/0x30c [ 1099.479438] vfs_kern_mount.part.0+0x68/0x470 [ 1099.483922] do_mount+0x113c/0x2f10 [ 1099.487544] ? do_raw_spin_unlock+0x171/0x230 [ 1099.492993] ? check_preemption_disabled+0x41/0x280 [ 1099.498000] ? copy_mount_string+0x40/0x40 [ 1099.502229] ? copy_mount_options+0x59/0x380 [ 1099.506655] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1099.511658] ? kmem_cache_alloc_trace+0x323/0x380 [ 1099.516492] ? copy_mount_options+0x26f/0x380 [ 1099.520976] ksys_mount+0xcf/0x130 [ 1099.524504] __x64_sys_mount+0xba/0x150 [ 1099.528465] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.533049] do_syscall_64+0xf9/0x620 [ 1099.536840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.542015] RIP: 0033:0x46090a [ 1099.545206] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1099.564094] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1099.571787] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1099.579043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1099.586305] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 21:06:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1099.593581] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1099.600847] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:37 executing program 5 (fault-call:3 fault-nth:57): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1099.713758] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1099.786952] FAULT_INJECTION: forcing a failure. [ 1099.786952] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.800012] CPU: 0 PID: 8180 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1099.807826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.817220] Call Trace: [ 1099.819825] dump_stack+0x1fc/0x2fe [ 1099.823467] should_fail.cold+0xa/0x14 [ 1099.827368] ? setup_fault_attr+0x200/0x200 [ 1099.831712] __should_failslab+0x115/0x180 [ 1099.835964] should_failslab+0x5/0xf [ 1099.839688] kmem_cache_alloc+0x3f/0x370 [ 1099.843749] ? mempool_alloc+0x350/0x350 [ 1099.847893] mempool_alloc+0x146/0x350 [ 1099.851778] ? mempool_resize+0x790/0x790 [ 1099.855926] ? lock_downgrade+0x720/0x720 [ 1099.860081] ? mark_held_locks+0xa6/0xf0 [ 1099.864194] bio_alloc_bioset+0x389/0x5e0 [ 1099.868341] ? __find_get_block+0x314/0xde0 [ 1099.872662] ? bvec_alloc+0x2f0/0x2f0 [ 1099.876449] ? __getblk_slow+0x6a3/0x9e0 [ 1099.880495] submit_bh_wbc+0x141/0x760 [ 1099.884380] __bread_gfp+0x14e/0x300 [ 1099.888102] ext4_fill_super+0x57b/0xc820 [ 1099.892269] ? vsnprintf+0x2cc/0x14f0 [ 1099.896068] ? pointer+0x850/0x850 [ 1099.899592] ? lock_downgrade+0x720/0x720 [ 1099.903727] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1099.908827] ? snprintf+0xbb/0xf0 [ 1099.912494] ? vsprintf+0x30/0x30 [ 1099.915979] ? wait_for_completion_io+0x10/0x10 [ 1099.920631] ? set_blocksize+0x163/0x3f0 [ 1099.924695] mount_bdev+0x2fc/0x3b0 [ 1099.928329] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1099.933439] mount_fs+0xa3/0x30c [ 1099.936854] vfs_kern_mount.part.0+0x68/0x470 [ 1099.941335] do_mount+0x113c/0x2f10 [ 1099.944961] ? lock_acquire+0x170/0x3c0 [ 1099.948941] ? check_preemption_disabled+0x41/0x280 [ 1099.953952] ? copy_mount_string+0x40/0x40 [ 1099.958184] ? copy_mount_options+0x59/0x380 [ 1099.962578] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1099.967588] ? kmem_cache_alloc_trace+0x323/0x380 [ 1099.972439] ? copy_mount_options+0x26f/0x380 [ 1099.976939] ksys_mount+0xcf/0x130 [ 1099.980474] __x64_sys_mount+0xba/0x150 [ 1099.984454] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.989029] do_syscall_64+0xf9/0x620 [ 1099.992815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.997990] RIP: 0033:0x46090a [ 1100.001175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1100.020080] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1100.027795] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1100.035058] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1100.042319] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1100.049579] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1100.056835] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1100.097794] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:06:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:38 executing program 5 (fault-call:3 fault-nth:58): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1101.143101] FAULT_INJECTION: forcing a failure. [ 1101.143101] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.157804] CPU: 1 PID: 8195 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1101.166155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.170851] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1101.175530] Call Trace: [ 1101.175558] dump_stack+0x1fc/0x2fe [ 1101.175582] should_fail.cold+0xa/0x14 [ 1101.175598] ? setup_fault_attr+0x200/0x200 [ 1101.175612] ? lock_acquire+0x170/0x3c0 [ 1101.175634] __should_failslab+0x115/0x180 [ 1101.206508] should_failslab+0x5/0xf [ 1101.210252] __kmalloc_track_caller+0x2a6/0x3c0 [ 1101.214907] ? ext4_fill_super+0xda/0xc820 [ 1101.219128] kstrdup+0x36/0x70 [ 1101.222305] ext4_fill_super+0xda/0xc820 [ 1101.226351] ? enable_ptr_key_workfn+0x30/0x30 [ 1101.230926] ? vsnprintf+0x2cc/0x14f0 [ 1101.234895] ? pointer+0x850/0x850 [ 1101.238436] ? lock_downgrade+0x720/0x720 [ 1101.242588] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1101.247690] ? snprintf+0xbb/0xf0 [ 1101.251130] ? vsprintf+0x30/0x30 [ 1101.254667] ? wait_for_completion_io+0x10/0x10 [ 1101.259444] ? set_blocksize+0x163/0x3f0 [ 1101.264177] mount_bdev+0x2fc/0x3b0 [ 1101.267802] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1101.272892] mount_fs+0xa3/0x30c [ 1101.276258] vfs_kern_mount.part.0+0x68/0x470 [ 1101.280754] do_mount+0x113c/0x2f10 [ 1101.284381] ? do_raw_spin_unlock+0x171/0x230 [ 1101.288858] ? check_preemption_disabled+0x41/0x280 [ 1101.293855] ? copy_mount_string+0x40/0x40 [ 1101.298077] ? copy_mount_options+0x59/0x380 [ 1101.302473] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1101.307908] ? kmem_cache_alloc_trace+0x323/0x380 [ 1101.312735] ? copy_mount_options+0x26f/0x380 [ 1101.317213] ksys_mount+0xcf/0x130 [ 1101.320737] __x64_sys_mount+0xba/0x150 [ 1101.324704] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1101.329276] do_syscall_64+0xf9/0x620 [ 1101.333066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.338243] RIP: 0033:0x46090a [ 1101.341597] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1101.361283] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1101.371015] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1101.379003] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1101.386351] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1101.393606] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1101.400880] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x747000, 0x0) 21:06:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d4", 0x1a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:39 executing program 5 (fault-call:3 fault-nth:59): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1102.040098] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1102.053360] FAULT_INJECTION: forcing a failure. [ 1102.053360] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.071527] CPU: 1 PID: 8232 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1102.079350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.088696] Call Trace: [ 1102.091278] dump_stack+0x1fc/0x2fe [ 1102.094898] should_fail.cold+0xa/0x14 [ 1102.098774] ? setup_fault_attr+0x200/0x200 [ 1102.103081] ? lock_acquire+0x170/0x3c0 [ 1102.107049] __should_failslab+0x115/0x180 [ 1102.111271] should_failslab+0x5/0xf [ 1102.123736] __kmalloc+0x2ab/0x3c0 [ 1102.127265] ? mb_cache_create+0x155/0x4c0 [ 1102.131485] mb_cache_create+0x155/0x4c0 [ 1102.135534] ext4_fill_super+0x97b1/0xc820 [ 1102.139782] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.144892] ? snprintf+0xbb/0xf0 [ 1102.148334] ? wait_for_completion_io+0x10/0x10 [ 1102.152993] ? set_blocksize+0x163/0x3f0 [ 1102.157045] mount_bdev+0x2fc/0x3b0 [ 1102.160657] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.165747] mount_fs+0xa3/0x30c [ 1102.169221] vfs_kern_mount.part.0+0x68/0x470 [ 1102.173703] do_mount+0x113c/0x2f10 [ 1102.177319] ? lock_acquire+0x170/0x3c0 [ 1102.181280] ? check_preemption_disabled+0x41/0x280 [ 1102.186281] ? copy_mount_string+0x40/0x40 [ 1102.190500] ? copy_mount_options+0x59/0x380 [ 1102.194895] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1102.199895] ? kmem_cache_alloc_trace+0x323/0x380 [ 1102.204752] ? copy_mount_options+0x26f/0x380 [ 1102.209238] ksys_mount+0xcf/0x130 [ 1102.212763] __x64_sys_mount+0xba/0x150 [ 1102.216725] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1102.221306] do_syscall_64+0xf9/0x620 [ 1102.225093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.230281] RIP: 0033:0x46090a [ 1102.233459] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1102.252355] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1102.260050] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1102.267308] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1102.274561] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1102.281830] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1102.289095] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647", 0x2c}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1102.320832] EXT4-fs (loop5): Failed to create ea_block_cache 21:06:39 executing program 5 (fault-call:3 fault-nth:60): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1102.469253] FAULT_INJECTION: forcing a failure. [ 1102.469253] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.481535] CPU: 1 PID: 8253 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1102.489357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.498737] Call Trace: [ 1102.501337] dump_stack+0x1fc/0x2fe [ 1102.504995] should_fail.cold+0xa/0x14 [ 1102.508897] ? setup_fault_attr+0x200/0x200 [ 1102.513230] ? lock_acquire+0x170/0x3c0 [ 1102.517220] __should_failslab+0x115/0x180 [ 1102.521465] should_failslab+0x5/0xf [ 1102.525193] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1102.529082] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1102.530313] __kmalloc_node+0x38/0x70 [ 1102.530330] kvmalloc_node+0x61/0xf0 [ 1102.546136] ext4_fill_super+0x425d/0xc820 [ 1102.550401] ? pointer+0x850/0x850 [ 1102.553958] ? lock_downgrade+0x720/0x720 [ 1102.558107] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.563241] ? snprintf+0xbb/0xf0 [ 1102.566712] ? wait_for_completion_io+0x10/0x10 [ 1102.571368] ? set_blocksize+0x163/0x3f0 [ 1102.575450] mount_bdev+0x2fc/0x3b0 [ 1102.579075] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.584176] mount_fs+0xa3/0x30c [ 1102.587541] vfs_kern_mount.part.0+0x68/0x470 [ 1102.592042] do_mount+0x113c/0x2f10 [ 1102.595675] ? do_raw_spin_unlock+0x171/0x230 [ 1102.600181] ? check_preemption_disabled+0x41/0x280 [ 1102.605197] ? copy_mount_string+0x40/0x40 [ 1102.609432] ? copy_mount_options+0x59/0x380 [ 1102.613848] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1102.618871] ? kmem_cache_alloc_trace+0x323/0x380 [ 1102.623753] ? copy_mount_options+0x26f/0x380 [ 1102.628251] ksys_mount+0xcf/0x130 [ 1102.631789] __x64_sys_mount+0xba/0x150 [ 1102.635763] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1102.640354] do_syscall_64+0xf9/0x620 [ 1102.644150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.649341] RIP: 0033:0x46090a [ 1102.652540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1102.671428] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1102.679122] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1102.686395] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1102.693645] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1102.700904] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1102.708164] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1102.717567] EXT4-fs (loop5): not enough memory 21:06:40 executing program 5 (fault-call:3 fault-nth:61): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1102.839539] FAULT_INJECTION: forcing a failure. [ 1102.839539] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.859290] CPU: 0 PID: 8269 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1102.867120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.876486] Call Trace: [ 1102.879087] dump_stack+0x1fc/0x2fe [ 1102.882728] should_fail.cold+0xa/0x14 [ 1102.886634] ? setup_fault_attr+0x200/0x200 [ 1102.890964] ? lock_acquire+0x170/0x3c0 [ 1102.894958] __should_failslab+0x115/0x180 [ 1102.899204] should_failslab+0x5/0xf [ 1102.902918] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1102.908004] __kmalloc_node+0x38/0x70 [ 1102.911803] kvmalloc_node+0x61/0xf0 [ 1102.915509] ext4_fill_super+0x425d/0xc820 [ 1102.919736] ? pointer+0x850/0x850 [ 1102.923277] ? lock_downgrade+0x720/0x720 [ 1102.927413] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.932504] ? snprintf+0xbb/0xf0 [ 1102.935943] ? wait_for_completion_io+0x10/0x10 [ 1102.940613] ? set_blocksize+0x163/0x3f0 [ 1102.944671] mount_bdev+0x2fc/0x3b0 [ 1102.948282] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1102.953368] mount_fs+0xa3/0x30c [ 1102.956736] vfs_kern_mount.part.0+0x68/0x470 [ 1102.961229] do_mount+0x113c/0x2f10 [ 1102.964844] ? do_raw_spin_unlock+0x171/0x230 [ 1102.969324] ? check_preemption_disabled+0x41/0x280 [ 1102.974325] ? copy_mount_string+0x40/0x40 [ 1102.978542] ? copy_mount_options+0x59/0x380 [ 1102.982933] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1102.987942] ? kmem_cache_alloc_trace+0x323/0x380 [ 1102.992777] ? copy_mount_options+0x26f/0x380 [ 1102.997270] ksys_mount+0xcf/0x130 [ 1103.000794] __x64_sys_mount+0xba/0x150 [ 1103.004754] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1103.009342] do_syscall_64+0xf9/0x620 [ 1103.013140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.018318] RIP: 0033:0x46090a [ 1103.021496] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1103.040395] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1103.048357] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1103.055681] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1103.062990] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1103.070244] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1103.077501] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1103.106804] EXT4-fs (loop5): not enough memory 21:06:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x750000, 0x0) 21:06:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1104.617155] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:06:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d4", 0x1a}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:42 executing program 5 (fault-call:3 fault-nth:62): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x805400, 0x0) 21:06:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1105.051410] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1105.076073] FAULT_INJECTION: forcing a failure. [ 1105.076073] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.092084] CPU: 0 PID: 8308 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1105.099901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.109241] Call Trace: [ 1105.111820] dump_stack+0x1fc/0x2fe [ 1105.115436] should_fail.cold+0xa/0x14 [ 1105.119320] ? setup_fault_attr+0x200/0x200 [ 1105.123633] ? lock_acquire+0x170/0x3c0 [ 1105.127625] __should_failslab+0x115/0x180 [ 1105.131842] should_failslab+0x5/0xf [ 1105.135537] __kmalloc+0x2ab/0x3c0 [ 1105.139112] ? crypto_create_tfm+0x79/0x2e0 [ 1105.143415] ? up_read+0x17/0x110 [ 1105.146854] crypto_create_tfm+0x79/0x2e0 [ 1105.150999] crypto_alloc_tfm+0xff/0x230 [ 1105.155057] ext4_fill_super+0xb00/0xc820 [ 1105.159209] ? vsnprintf+0x2cc/0x14f0 [ 1105.166060] ? pointer+0x850/0x850 [ 1105.169583] ? lock_downgrade+0x720/0x720 [ 1105.173718] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.178805] ? snprintf+0xbb/0xf0 [ 1105.182239] ? vsprintf+0x30/0x30 [ 1105.185676] ? wait_for_completion_io+0x10/0x10 [ 1105.190339] ? set_blocksize+0x163/0x3f0 [ 1105.194391] mount_bdev+0x2fc/0x3b0 [ 1105.198005] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.203124] mount_fs+0xa3/0x30c [ 1105.206478] vfs_kern_mount.part.0+0x68/0x470 [ 1105.210975] do_mount+0x113c/0x2f10 [ 1105.214600] ? do_raw_spin_unlock+0x171/0x230 [ 1105.219100] ? check_preemption_disabled+0x41/0x280 [ 1105.224109] ? copy_mount_string+0x40/0x40 [ 1105.228328] ? copy_mount_options+0x59/0x380 [ 1105.232718] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1105.237717] ? kmem_cache_alloc_trace+0x323/0x380 [ 1105.242543] ? copy_mount_options+0x26f/0x380 [ 1105.247023] ksys_mount+0xcf/0x130 [ 1105.250549] __x64_sys_mount+0xba/0x150 [ 1105.254517] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1105.259094] do_syscall_64+0xf9/0x620 [ 1105.262878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.268061] RIP: 0033:0x46090a [ 1105.271237] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1105.290133] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1105.297822] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1105.305166] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1105.312417] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1105.319676] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1105.326933] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1105.338652] EXT4-fs (loop5): Cannot load crc32c driver. 21:06:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078ce", 0x33}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:42 executing program 5 (fault-call:3 fault-nth:63): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1105.479568] FAULT_INJECTION: forcing a failure. [ 1105.479568] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.498455] CPU: 1 PID: 8324 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1105.506288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.515647] Call Trace: [ 1105.518252] dump_stack+0x1fc/0x2fe [ 1105.521895] should_fail.cold+0xa/0x14 [ 1105.525796] ? setup_fault_attr+0x200/0x200 [ 1105.530123] ? lock_acquire+0x170/0x3c0 [ 1105.534122] __should_failslab+0x115/0x180 [ 1105.538362] should_failslab+0x5/0xf [ 1105.542084] kmem_cache_alloc_trace+0x284/0x380 [ 1105.546767] prealloc_shrinker+0x8d/0x340 [ 1105.550921] register_shrinker+0x13/0x40 [ 1105.554986] mb_cache_create+0x275/0x4c0 [ 1105.559060] ext4_fill_super+0x97b1/0xc820 [ 1105.563331] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.568448] ? snprintf+0xbb/0xf0 [ 1105.572030] ? wait_for_completion_io+0x10/0x10 [ 1105.576705] ? set_blocksize+0x163/0x3f0 [ 1105.580782] mount_bdev+0x2fc/0x3b0 [ 1105.584420] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.589533] mount_fs+0xa3/0x30c [ 1105.592914] vfs_kern_mount.part.0+0x68/0x470 [ 1105.597511] do_mount+0x113c/0x2f10 [ 1105.601139] ? lock_acquire+0x170/0x3c0 [ 1105.605106] ? check_preemption_disabled+0x41/0x280 [ 1105.610113] ? copy_mount_string+0x40/0x40 [ 1105.614341] ? copy_mount_options+0x59/0x380 [ 1105.618739] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1105.623745] ? kmem_cache_alloc_trace+0x323/0x380 [ 1105.628582] ? copy_mount_options+0x26f/0x380 [ 1105.633085] ksys_mount+0xcf/0x130 [ 1105.636616] __x64_sys_mount+0xba/0x150 [ 1105.640578] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1105.645145] do_syscall_64+0xf9/0x620 [ 1105.648934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.654107] RIP: 0033:0x46090a [ 1105.657283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1105.676169] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1105.683860] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1105.691112] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1105.698364] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1105.705615] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1105.712866] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1105.722462] EXT4-fs (loop5): Failed to create ea_block_cache 21:06:43 executing program 5 (fault-call:3 fault-nth:64): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1105.739739] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:06:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1105.816657] FAULT_INJECTION: forcing a failure. [ 1105.816657] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.828549] CPU: 1 PID: 8345 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1105.836362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.845720] Call Trace: [ 1105.848319] dump_stack+0x1fc/0x2fe [ 1105.851963] should_fail.cold+0xa/0x14 [ 1105.855863] ? setup_fault_attr+0x200/0x200 [ 1105.860190] ? lock_acquire+0x170/0x3c0 [ 1105.864190] __should_failslab+0x115/0x180 [ 1105.868434] should_failslab+0x5/0xf [ 1105.872163] kmem_cache_alloc_trace+0x284/0x380 [ 1105.876846] prealloc_shrinker+0x8d/0x340 [ 1105.881005] register_shrinker+0x13/0x40 [ 1105.885073] mb_cache_create+0x275/0x4c0 [ 1105.889156] ext4_fill_super+0x97b1/0xc820 [ 1105.893421] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.898537] ? snprintf+0xbb/0xf0 [ 1105.902008] ? wait_for_completion_io+0x10/0x10 [ 1105.906689] ? set_blocksize+0x163/0x3f0 [ 1105.910754] mount_bdev+0x2fc/0x3b0 [ 1105.916198] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1105.921292] mount_fs+0xa3/0x30c [ 1105.924678] vfs_kern_mount.part.0+0x68/0x470 [ 1105.929161] do_mount+0x113c/0x2f10 [ 1105.932787] ? lock_acquire+0x170/0x3c0 [ 1105.936747] ? check_preemption_disabled+0x41/0x280 [ 1105.941767] ? copy_mount_string+0x40/0x40 [ 1105.945989] ? copy_mount_options+0x59/0x380 [ 1105.950385] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1105.955387] ? kmem_cache_alloc_trace+0x323/0x380 [ 1105.960217] ? copy_mount_options+0x26f/0x380 [ 1105.964701] ksys_mount+0xcf/0x130 [ 1105.968228] __x64_sys_mount+0xba/0x150 [ 1105.972188] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1105.976756] do_syscall_64+0xf9/0x620 [ 1105.980546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.985720] RIP: 0033:0x46090a [ 1105.988900] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1106.007784] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1106.015476] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1106.022740] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1106.029997] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1106.037253] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1106.044531] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:43 executing program 5 (fault-call:3 fault-nth:65): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1106.071882] EXT4-fs (loop5): Failed to create ea_block_cache [ 1106.097239] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:06:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1106.162926] FAULT_INJECTION: forcing a failure. [ 1106.162926] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.190544] CPU: 0 PID: 8358 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1106.198476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.207833] Call Trace: [ 1106.210434] dump_stack+0x1fc/0x2fe [ 1106.214075] should_fail.cold+0xa/0x14 [ 1106.217973] ? setup_fault_attr+0x200/0x200 [ 1106.222301] ? lock_acquire+0x170/0x3c0 [ 1106.226301] __should_failslab+0x115/0x180 [ 1106.230547] should_failslab+0x5/0xf [ 1106.234269] __kmalloc+0x2ab/0x3c0 [ 1106.237813] ? mb_cache_create+0x155/0x4c0 [ 1106.242047] mb_cache_create+0x155/0x4c0 [ 1106.246100] ext4_fill_super+0x97b1/0xc820 [ 1106.250339] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1106.255432] ? snprintf+0xbb/0xf0 [ 1106.258878] ? wait_for_completion_io+0x10/0x10 [ 1106.263542] ? set_blocksize+0x163/0x3f0 [ 1106.267610] mount_bdev+0x2fc/0x3b0 [ 1106.271226] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1106.276316] mount_fs+0xa3/0x30c [ 1106.279672] vfs_kern_mount.part.0+0x68/0x470 [ 1106.284155] do_mount+0x113c/0x2f10 [ 1106.287782] ? lock_acquire+0x170/0x3c0 [ 1106.291742] ? check_preemption_disabled+0x41/0x280 [ 1106.296745] ? copy_mount_string+0x40/0x40 [ 1106.301061] ? copy_mount_options+0x59/0x380 [ 1106.305468] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1106.310469] ? kmem_cache_alloc_trace+0x323/0x380 [ 1106.315298] ? copy_mount_options+0x26f/0x380 [ 1106.319781] ksys_mount+0xcf/0x130 [ 1106.323307] __x64_sys_mount+0xba/0x150 [ 1106.327267] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1106.331841] do_syscall_64+0xf9/0x620 [ 1106.335630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.340803] RIP: 0033:0x46090a [ 1106.343982] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1106.362868] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1106.370571] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1106.377827] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1106.385083] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1106.392337] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1106.399594] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1106.410593] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1106.437176] EXT4-fs (loop5): Failed to create ea_block_cache 21:06:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2", 0x27}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:45 executing program 5 (fault-call:3 fault-nth:66): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xf0ffff, 0x0) [ 1108.116047] FAULT_INJECTION: forcing a failure. [ 1108.116047] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.124495] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1108.138244] CPU: 0 PID: 8389 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1108.146062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.155541] Call Trace: [ 1108.158144] dump_stack+0x1fc/0x2fe [ 1108.161786] should_fail.cold+0xa/0x14 [ 1108.165686] ? setup_fault_attr+0x200/0x200 [ 1108.170014] ? lock_acquire+0x170/0x3c0 [ 1108.174010] __should_failslab+0x115/0x180 [ 1108.178251] should_failslab+0x5/0xf [ 1108.181978] __kmalloc+0x2ab/0x3c0 [ 1108.185529] ? apply_wqattrs_prepare+0xf7/0xa50 [ 1108.190202] apply_wqattrs_prepare+0xf7/0xa50 [ 1108.194694] apply_workqueue_attrs_locked+0xc5/0x120 [ 1108.199785] __alloc_workqueue_key+0x510/0xed0 [ 1108.204357] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1108.209369] ext4_fill_super+0x6edb/0xc820 [ 1108.213606] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1108.218699] ? snprintf+0xbb/0xf0 [ 1108.222156] ? wait_for_completion_io+0x10/0x10 [ 1108.226811] ? set_blocksize+0x163/0x3f0 [ 1108.230861] mount_bdev+0x2fc/0x3b0 [ 1108.234473] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1108.239562] mount_fs+0xa3/0x30c [ 1108.243008] vfs_kern_mount.part.0+0x68/0x470 [ 1108.247492] do_mount+0x113c/0x2f10 [ 1108.251111] ? lock_acquire+0x170/0x3c0 [ 1108.255071] ? check_preemption_disabled+0x41/0x280 [ 1108.260074] ? copy_mount_string+0x40/0x40 [ 1108.264293] ? copy_mount_options+0x59/0x380 [ 1108.268687] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1108.273687] ? kmem_cache_alloc_trace+0x323/0x380 [ 1108.278515] ? copy_mount_options+0x26f/0x380 [ 1108.283004] ksys_mount+0xcf/0x130 [ 1108.286530] __x64_sys_mount+0xba/0x150 [ 1108.290489] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1108.295057] do_syscall_64+0xf9/0x620 [ 1108.298847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1108.304019] RIP: 0033:0x46090a [ 1108.307195] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1108.326166] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1108.333856] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1108.341109] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1108.348387] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1108.355644] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1108.362897] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1108.372546] EXT4-fs: failed to create workqueue [ 1108.377473] EXT4-fs (loop5): mount failed 21:06:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078ce", 0x33}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:45 executing program 5 (fault-call:3 fault-nth:67): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1108.483726] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1108.547425] FAULT_INJECTION: forcing a failure. [ 1108.547425] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.582107] CPU: 0 PID: 8411 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1108.589946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.599305] Call Trace: [ 1108.601898] dump_stack+0x1fc/0x2fe [ 1108.605530] should_fail.cold+0xa/0x14 [ 1108.609413] ? setup_fault_attr+0x200/0x200 [ 1108.613719] ? lock_acquire+0x170/0x3c0 [ 1108.617680] __should_failslab+0x115/0x180 [ 1108.621948] should_failslab+0x5/0xf [ 1108.626549] kmem_cache_alloc_trace+0x284/0x380 [ 1108.631225] prealloc_shrinker+0x8d/0x340 [ 1108.635400] register_shrinker+0x13/0x40 [ 1108.639450] mb_cache_create+0x275/0x4c0 [ 1108.643497] ext4_fill_super+0x97b1/0xc820 [ 1108.647729] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1108.652837] ? snprintf+0xbb/0xf0 [ 1108.656278] ? wait_for_completion_io+0x10/0x10 [ 1108.661035] ? set_blocksize+0x163/0x3f0 [ 1108.665778] mount_bdev+0x2fc/0x3b0 [ 1108.669387] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1108.674489] mount_fs+0xa3/0x30c [ 1108.677857] vfs_kern_mount.part.0+0x68/0x470 [ 1108.682354] do_mount+0x113c/0x2f10 [ 1108.685964] ? lock_acquire+0x170/0x3c0 [ 1108.689920] ? check_preemption_disabled+0x41/0x280 [ 1108.694920] ? copy_mount_string+0x40/0x40 [ 1108.699137] ? copy_mount_options+0x59/0x380 [ 1108.703529] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1108.708543] ? kmem_cache_alloc_trace+0x323/0x380 [ 1108.713383] ? copy_mount_options+0x26f/0x380 [ 1108.717871] ksys_mount+0xcf/0x130 [ 1108.721404] __x64_sys_mount+0xba/0x150 [ 1108.725385] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1108.729955] do_syscall_64+0xf9/0x620 [ 1108.733769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1108.738944] RIP: 0033:0x46090a [ 1108.742121] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1108.761022] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1108.768720] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1108.775974] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1108.783272] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1108.790539] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 21:06:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1108.797808] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1108.814102] EXT4-fs (loop5): Failed to create ea_block_cache 21:06:46 executing program 5 (fault-call:3 fault-nth:68): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1108.880549] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1108.933212] FAULT_INJECTION: forcing a failure. [ 1108.933212] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.945072] CPU: 1 PID: 8428 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1108.952969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.962442] Call Trace: [ 1108.965075] dump_stack+0x1fc/0x2fe [ 1108.968719] should_fail.cold+0xa/0x14 [ 1108.972617] ? setup_fault_attr+0x200/0x200 [ 1108.976945] ? lock_acquire+0x170/0x3c0 [ 1108.980986] __should_failslab+0x115/0x180 [ 1108.985224] should_failslab+0x5/0xf [ 1108.988956] kmem_cache_alloc_trace+0x284/0x380 [ 1108.993662] apply_wqattrs_prepare+0x1c4/0xa50 [ 1108.998261] apply_workqueue_attrs_locked+0xc5/0x120 [ 1109.003375] __alloc_workqueue_key+0x510/0xed0 [ 1109.007975] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1109.013025] ext4_fill_super+0x6edb/0xc820 [ 1109.017295] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1109.022415] ? snprintf+0xbb/0xf0 [ 1109.025887] ? wait_for_completion_io+0x10/0x10 [ 1109.030568] ? set_blocksize+0x163/0x3f0 [ 1109.034625] mount_bdev+0x2fc/0x3b0 [ 1109.038248] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1109.043350] mount_fs+0xa3/0x30c [ 1109.046730] vfs_kern_mount.part.0+0x68/0x470 [ 1109.051236] do_mount+0x113c/0x2f10 [ 1109.054855] ? lock_acquire+0x170/0x3c0 [ 1109.058822] ? check_preemption_disabled+0x41/0x280 [ 1109.063835] ? copy_mount_string+0x40/0x40 [ 1109.068071] ? copy_mount_options+0x59/0x380 [ 1109.072476] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1109.077489] ? kmem_cache_alloc_trace+0x323/0x380 [ 1109.082327] ? copy_mount_options+0x26f/0x380 [ 1109.086822] ksys_mount+0xcf/0x130 [ 1109.090360] __x64_sys_mount+0xba/0x150 [ 1109.094358] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1109.098928] do_syscall_64+0xf9/0x620 [ 1109.102715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.107896] RIP: 0033:0x46090a [ 1109.111106] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1109.130004] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1109.137702] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1109.144966] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1109.152246] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1109.159501] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1109.166766] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1109.175691] EXT4-fs: failed to create workqueue 21:06:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1109.180456] EXT4-fs (loop5): mount failed 21:06:46 executing program 5 (fault-call:3 fault-nth:69): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1109.269474] FAULT_INJECTION: forcing a failure. [ 1109.269474] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1109.282415] CPU: 1 PID: 8440 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1109.290237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.299594] Call Trace: [ 1109.302195] dump_stack+0x1fc/0x2fe [ 1109.305228] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1109.305832] should_fail.cold+0xa/0x14 [ 1109.317923] ? setup_fault_attr+0x200/0x200 [ 1109.322323] __alloc_pages_nodemask+0x239/0x2890 [ 1109.327075] ? kasan_kmalloc+0x139/0x160 [ 1109.331129] ? mark_held_locks+0xf0/0xf0 [ 1109.335285] ? do_syscall_64+0xf9/0x620 [ 1109.339247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.344602] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1109.349491] ? mark_held_locks+0xf0/0xf0 [ 1109.353561] ? __debug_object_init+0x410/0x9b0 [ 1109.358215] ? mark_held_locks+0xa6/0xf0 [ 1109.362273] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1109.367894] alloc_pages_current+0x193/0x2a0 [ 1109.372399] ? __debug_object_init+0x410/0x9b0 [ 1109.376976] get_zeroed_page+0x10/0x40 [ 1109.380848] ext4_calculate_overhead+0xfb/0x11c0 [ 1109.385597] ext4_fill_super+0x9681/0xc820 [ 1109.389829] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1109.394924] ? snprintf+0xbb/0xf0 [ 1109.398366] ? wait_for_completion_io+0x10/0x10 [ 1109.403018] ? set_blocksize+0x163/0x3f0 [ 1109.407073] mount_bdev+0x2fc/0x3b0 [ 1109.410682] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1109.415779] mount_fs+0xa3/0x30c [ 1109.419151] vfs_kern_mount.part.0+0x68/0x470 [ 1109.423684] do_mount+0x113c/0x2f10 [ 1109.427298] ? lock_acquire+0x170/0x3c0 [ 1109.431288] ? check_preemption_disabled+0x41/0x280 [ 1109.436288] ? copy_mount_string+0x40/0x40 [ 1109.440509] ? copy_mount_options+0x59/0x380 [ 1109.444920] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1109.449923] ? kmem_cache_alloc_trace+0x323/0x380 [ 1109.454751] ? copy_mount_options+0x26f/0x380 [ 1109.459229] ksys_mount+0xcf/0x130 [ 1109.462752] __x64_sys_mount+0xba/0x150 [ 1109.466710] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1109.471275] do_syscall_64+0xf9/0x620 [ 1109.475065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.480254] RIP: 0033:0x46090a [ 1109.483429] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1109.502343] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1109.510049] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1109.517303] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1109.524560] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1109.531811] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1109.539084] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2", 0x27}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:48 executing program 5 (fault-call:3 fault-nth:70): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1000000, 0x0) [ 1111.163706] FAULT_INJECTION: forcing a failure. [ 1111.163706] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.180770] CPU: 0 PID: 8464 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1111.188601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.197970] Call Trace: [ 1111.200660] dump_stack+0x1fc/0x2fe [ 1111.204309] should_fail.cold+0xa/0x14 [ 1111.208212] ? setup_fault_attr+0x200/0x200 [ 1111.212547] ? lock_acquire+0x170/0x3c0 [ 1111.216542] __should_failslab+0x115/0x180 [ 1111.220807] should_failslab+0x5/0xf [ 1111.224536] kmem_cache_alloc_trace+0x284/0x380 [ 1111.229212] apply_wqattrs_prepare+0x137/0xa50 [ 1111.233803] apply_workqueue_attrs_locked+0xc5/0x120 [ 1111.238900] __alloc_workqueue_key+0x510/0xed0 [ 1111.243479] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1111.248599] ext4_fill_super+0x6edb/0xc820 [ 1111.252838] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1111.257928] ? snprintf+0xbb/0xf0 [ 1111.261384] ? wait_for_completion_io+0x10/0x10 [ 1111.266045] ? set_blocksize+0x163/0x3f0 [ 1111.270095] mount_bdev+0x2fc/0x3b0 [ 1111.273710] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1111.278799] mount_fs+0xa3/0x30c [ 1111.282156] vfs_kern_mount.part.0+0x68/0x470 [ 1111.286641] do_mount+0x113c/0x2f10 [ 1111.290274] ? lock_acquire+0x170/0x3c0 [ 1111.294237] ? check_preemption_disabled+0x41/0x280 [ 1111.299243] ? copy_mount_string+0x40/0x40 [ 1111.303478] ? copy_mount_options+0x59/0x380 [ 1111.307873] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1111.312874] ? kmem_cache_alloc_trace+0x323/0x380 [ 1111.317705] ? copy_mount_options+0x26f/0x380 [ 1111.322187] ksys_mount+0xcf/0x130 [ 1111.325714] __x64_sys_mount+0xba/0x150 [ 1111.329674] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1111.334254] do_syscall_64+0xf9/0x620 [ 1111.338061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1111.343236] RIP: 0033:0x46090a [ 1111.346418] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1111.365390] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1111.375110] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1111.383636] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1111.391954] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1111.399230] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1111.406835] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1111.416243] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1111.424784] EXT4-fs: failed to create workqueue [ 1111.424796] EXT4-fs (loop5): mount failed 21:06:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078ce", 0x33}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1190000, 0x0) 21:06:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:48 executing program 5 (fault-call:3 fault-nth:71): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1111.606234] FAULT_INJECTION: forcing a failure. [ 1111.606234] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.618210] CPU: 1 PID: 8493 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1111.626024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.635383] Call Trace: [ 1111.637983] dump_stack+0x1fc/0x2fe [ 1111.641626] should_fail.cold+0xa/0x14 [ 1111.645523] ? setup_fault_attr+0x200/0x200 [ 1111.649840] ? lock_acquire+0x170/0x3c0 [ 1111.653831] __should_failslab+0x115/0x180 [ 1111.658070] should_failslab+0x5/0xf [ 1111.661791] kmem_cache_alloc_trace+0x284/0x380 [ 1111.666482] apply_wqattrs_prepare+0x137/0xa50 [ 1111.671084] apply_workqueue_attrs_locked+0xc5/0x120 [ 1111.676200] __alloc_workqueue_key+0x510/0xed0 [ 1111.680799] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1111.685841] ext4_fill_super+0x6edb/0xc820 [ 1111.690111] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1111.695227] ? snprintf+0xbb/0xf0 [ 1111.698695] ? wait_for_completion_io+0x10/0x10 [ 1111.703555] ? set_blocksize+0x163/0x3f0 [ 1111.707653] mount_bdev+0x2fc/0x3b0 [ 1111.711291] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1111.716427] mount_fs+0xa3/0x30c [ 1111.719808] vfs_kern_mount.part.0+0x68/0x470 [ 1111.724320] do_mount+0x113c/0x2f10 [ 1111.727959] ? lock_acquire+0x170/0x3c0 [ 1111.731943] ? check_preemption_disabled+0x41/0x280 [ 1111.736976] ? copy_mount_string+0x40/0x40 [ 1111.741227] ? copy_mount_options+0x59/0x380 [ 1111.745651] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1111.750678] ? kmem_cache_alloc_trace+0x323/0x380 21:06:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1111.755530] ? copy_mount_options+0x26f/0x380 [ 1111.760029] ksys_mount+0xcf/0x130 [ 1111.763571] __x64_sys_mount+0xba/0x150 [ 1111.767556] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1111.772147] do_syscall_64+0xf9/0x620 [ 1111.775955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1111.781239] RIP: 0033:0x46090a [ 1111.784447] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1111.803359] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1111.811078] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1111.818363] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1111.825639] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1111.833788] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1111.841066] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1111.851964] EXT4-fs: failed to create workqueue [ 1111.856944] EXT4-fs (loop5): mount failed [ 1111.885926] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:06:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2", 0x27}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:06:51 executing program 5 (fault-call:3 fault-nth:72): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1114.190715] FAULT_INJECTION: forcing a failure. [ 1114.190715] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.205469] CPU: 1 PID: 8529 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1114.213292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.222652] Call Trace: [ 1114.225253] dump_stack+0x1fc/0x2fe [ 1114.228902] should_fail.cold+0xa/0x14 [ 1114.232801] ? setup_fault_attr+0x200/0x200 [ 1114.237132] ? lock_acquire+0x170/0x3c0 [ 1114.241127] __should_failslab+0x115/0x180 [ 1114.245370] should_failslab+0x5/0xf [ 1114.249093] kmem_cache_alloc_trace+0x284/0x380 [ 1114.253773] apply_wqattrs_prepare+0x1c4/0xa50 [ 1114.258379] apply_workqueue_attrs_locked+0xc5/0x120 [ 1114.263509] __alloc_workqueue_key+0x510/0xed0 [ 1114.268535] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1114.273556] ext4_fill_super+0x6edb/0xc820 [ 1114.277820] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1114.282922] ? snprintf+0xbb/0xf0 [ 1114.286379] ? wait_for_completion_io+0x10/0x10 [ 1114.291035] ? set_blocksize+0x163/0x3f0 [ 1114.295087] mount_bdev+0x2fc/0x3b0 [ 1114.298703] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1114.303808] mount_fs+0xa3/0x30c [ 1114.307168] vfs_kern_mount.part.0+0x68/0x470 [ 1114.311649] do_mount+0x113c/0x2f10 [ 1114.315264] ? lock_acquire+0x170/0x3c0 [ 1114.319222] ? check_preemption_disabled+0x41/0x280 [ 1114.324223] ? copy_mount_string+0x40/0x40 [ 1114.328452] ? copy_mount_options+0x59/0x380 [ 1114.332856] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1114.337861] ? kmem_cache_alloc_trace+0x323/0x380 [ 1114.342688] ? copy_mount_options+0x26f/0x380 [ 1114.347174] ksys_mount+0xcf/0x130 [ 1114.350704] __x64_sys_mount+0xba/0x150 [ 1114.354666] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1114.359233] do_syscall_64+0xf9/0x620 [ 1114.363028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.368200] RIP: 0033:0x46090a [ 1114.371378] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1114.390278] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1114.397970] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1114.405236] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1114.412502] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1114.419754] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1114.427111] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1114.450207] EXT4-fs: failed to create workqueue [ 1114.455133] EXT4-fs (loop5): mount failed [ 1114.461779] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:06:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd632145", 0x37}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:06:51 executing program 5 (fault-call:3 fault-nth:73): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1590000, 0x0) [ 1114.580045] FAULT_INJECTION: forcing a failure. [ 1114.580045] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.592467] CPU: 0 PID: 8555 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1114.600314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.610025] Call Trace: [ 1114.612633] dump_stack+0x1fc/0x2fe [ 1114.616273] should_fail.cold+0xa/0x14 [ 1114.620179] ? setup_fault_attr+0x200/0x200 [ 1114.624514] ? lock_acquire+0x170/0x3c0 [ 1114.628505] __should_failslab+0x115/0x180 [ 1114.632751] should_failslab+0x5/0xf [ 1114.636470] kmem_cache_alloc_node+0x245/0x3b0 [ 1114.641068] alloc_unbound_pwq+0x4a4/0xc10 [ 1114.645320] apply_wqattrs_prepare+0x3c0/0xa50 [ 1114.649926] apply_workqueue_attrs_locked+0xc5/0x120 [ 1114.655039] __alloc_workqueue_key+0x510/0xed0 [ 1114.659643] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1114.664684] ext4_fill_super+0x6edb/0xc820 [ 1114.668946] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1114.674061] ? snprintf+0xbb/0xf0 [ 1114.677527] ? wait_for_completion_io+0x10/0x10 [ 1114.682198] ? set_blocksize+0x163/0x3f0 [ 1114.686268] mount_bdev+0x2fc/0x3b0 [ 1114.689902] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1114.695020] mount_fs+0xa3/0x30c [ 1114.698401] vfs_kern_mount.part.0+0x68/0x470 [ 1114.702907] do_mount+0x113c/0x2f10 [ 1114.706663] ? do_raw_spin_unlock+0x171/0x230 [ 1114.711268] ? check_preemption_disabled+0x41/0x280 [ 1114.716294] ? copy_mount_string+0x40/0x40 [ 1114.720537] ? copy_mount_options+0x59/0x380 [ 1114.724944] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1114.729961] ? kmem_cache_alloc_trace+0x323/0x380 [ 1114.734810] ? copy_mount_options+0x26f/0x380 [ 1114.739326] ksys_mount+0xcf/0x130 [ 1114.743315] __x64_sys_mount+0xba/0x150 [ 1114.747385] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1114.751967] do_syscall_64+0xf9/0x620 [ 1114.755762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.761006] RIP: 0033:0x46090a [ 1114.764196] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1114.783101] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1114.790807] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1114.798061] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1114.805582] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1114.812842] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1114.820095] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x2000000, 0x0) 21:06:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1114.839399] EXT4-fs: failed to create workqueue [ 1114.855526] EXT4-fs (loop5): mount failed [ 1114.950598] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed06", 0x2e}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:54 executing program 5 (fault-call:3 fault-nth:74): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1117.257364] FAULT_INJECTION: forcing a failure. [ 1117.257364] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.279099] CPU: 1 PID: 8601 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1117.286938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.296303] Call Trace: [ 1117.298907] dump_stack+0x1fc/0x2fe [ 1117.302553] should_fail.cold+0xa/0x14 [ 1117.306454] ? setup_fault_attr+0x200/0x200 [ 1117.310785] ? lock_acquire+0x170/0x3c0 [ 1117.314799] __should_failslab+0x115/0x180 [ 1117.319048] should_failslab+0x5/0xf [ 1117.322761] kmem_cache_alloc_trace+0x284/0x380 [ 1117.327423] apply_wqattrs_prepare+0x137/0xa50 [ 1117.332002] apply_workqueue_attrs_locked+0xc5/0x120 [ 1117.337100] __alloc_workqueue_key+0x510/0xed0 [ 1117.341678] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1117.346693] ext4_fill_super+0x6edb/0xc820 [ 1117.350931] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1117.356025] ? snprintf+0xbb/0xf0 [ 1117.359469] ? wait_for_completion_io+0x10/0x10 [ 1117.364125] ? set_blocksize+0x163/0x3f0 [ 1117.368175] mount_bdev+0x2fc/0x3b0 [ 1117.371788] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1117.376879] mount_fs+0xa3/0x30c [ 1117.380256] vfs_kern_mount.part.0+0x68/0x470 [ 1117.384741] do_mount+0x113c/0x2f10 [ 1117.388385] ? do_raw_spin_unlock+0x171/0x230 [ 1117.392865] ? check_preemption_disabled+0x41/0x280 [ 1117.397867] ? copy_mount_string+0x40/0x40 [ 1117.402116] ? copy_mount_options+0x59/0x380 [ 1117.406517] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1117.411519] ? kmem_cache_alloc_trace+0x323/0x380 [ 1117.416351] ? copy_mount_options+0x26f/0x380 [ 1117.420836] ksys_mount+0xcf/0x130 [ 1117.424366] __x64_sys_mount+0xba/0x150 [ 1117.428341] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1117.432908] do_syscall_64+0xf9/0x620 [ 1117.436700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1117.441871] RIP: 0033:0x46090a [ 1117.445051] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1117.463955] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1117.471667] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1117.478938] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1117.486191] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1117.493447] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1117.500701] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd632145", 0x37}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:54 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1117.510775] EXT4-fs: failed to create workqueue [ 1117.517218] EXT4-fs (loop5): mount failed [ 1117.522176] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:54 executing program 5 (fault-call:3 fault-nth:75): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:54 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1117.569477] ptrace attach of "/root/syz-executor.0"[8615] was attempted by "/root/syz-executor.0"[8616] 21:06:55 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1117.626880] ptrace attach of "/root/syz-executor.0"[8626] was attempted by "/root/syz-executor.0"[8627] [ 1117.672914] ptrace attach of "/root/syz-executor.0"[8631] was attempted by "/root/syz-executor.0"[8633] [ 1117.687574] FAULT_INJECTION: forcing a failure. [ 1117.687574] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.717099] CPU: 0 PID: 8630 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1117.724937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.734298] Call Trace: [ 1117.736902] dump_stack+0x1fc/0x2fe [ 1117.740544] should_fail.cold+0xa/0x14 [ 1117.744436] ? __alloc_workqueue_key+0x5e4/0xed0 [ 1117.749175] ? setup_fault_attr+0x200/0x200 [ 1117.753502] __should_failslab+0x115/0x180 [ 1117.757745] should_failslab+0x5/0xf [ 1117.761464] kmem_cache_alloc+0x277/0x370 [ 1117.765617] ? ext4_sync_fs+0x8d0/0x8d0 [ 1117.769601] ext4_alloc_inode+0x1a/0x630 [ 1117.773670] ? ext4_sync_fs+0x8d0/0x8d0 [ 1117.777656] alloc_inode+0x5d/0x180 [ 1117.781291] iget_locked+0x193/0x480 [ 1117.785023] __ext4_iget+0x279/0x3e00 [ 1117.788845] ? __alloc_workqueue_key+0x92d/0xed0 [ 1117.793609] ? ext4_get_projid+0x190/0x190 [ 1117.797848] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1117.802916] ext4_fill_super+0x6f83/0xc820 [ 1117.807194] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1117.812303] ? snprintf+0xbb/0xf0 [ 1117.815752] ? wait_for_completion_io+0x10/0x10 [ 1117.820407] ? set_blocksize+0x163/0x3f0 [ 1117.824456] mount_bdev+0x2fc/0x3b0 [ 1117.828069] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1117.833160] mount_fs+0xa3/0x30c [ 1117.836533] vfs_kern_mount.part.0+0x68/0x470 [ 1117.841016] do_mount+0x113c/0x2f10 [ 1117.844629] ? lock_acquire+0x170/0x3c0 [ 1117.848587] ? check_preemption_disabled+0x41/0x280 [ 1117.853612] ? copy_mount_string+0x40/0x40 [ 1117.857838] ? copy_mount_options+0x59/0x380 [ 1117.862233] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1117.867233] ? kmem_cache_alloc_trace+0x323/0x380 [ 1117.872073] ? copy_mount_options+0x26f/0x380 [ 1117.876575] ksys_mount+0xcf/0x130 [ 1117.880130] __x64_sys_mount+0xba/0x150 [ 1117.884102] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1117.888708] do_syscall_64+0xf9/0x620 [ 1117.892503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1117.897681] RIP: 0033:0x46090a [ 1117.900887] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1117.920022] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1117.927735] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1117.935005] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1117.942288] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1117.949565] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1117.956837] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1117.966766] EXT4-fs (loop5): get root inode failed 21:06:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x4270000, 0x0) 21:06:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd632145", 0x37}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1117.971837] EXT4-fs (loop5): mount failed 21:06:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed06", 0x2e}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:57 executing program 5 (fault-call:3 fault-nth:76): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1120.247306] FAULT_INJECTION: forcing a failure. [ 1120.247306] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.259237] CPU: 0 PID: 8664 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1120.267051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.276428] Call Trace: [ 1120.279035] dump_stack+0x1fc/0x2fe [ 1120.283247] should_fail.cold+0xa/0x14 [ 1120.287152] ? setup_fault_attr+0x200/0x200 [ 1120.291494] ? lock_acquire+0x170/0x3c0 [ 1120.295493] __should_failslab+0x115/0x180 [ 1120.299735] should_failslab+0x5/0xf [ 1120.303457] kmem_cache_alloc_trace+0x284/0x380 [ 1120.308266] ? cancel_delayed_work+0x2c0/0x2c0 [ 1120.309350] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1120.312849] __kthread_create_on_node+0xd2/0x410 [ 1120.312867] ? mark_held_locks+0xf0/0xf0 [ 1120.312878] ? kthread_parkme+0xa0/0xa0 [ 1120.312902] ? __alloc_workqueue_key+0x51e/0xed0 [ 1120.312919] ? cancel_delayed_work+0x2c0/0x2c0 [ 1120.312933] kthread_create_on_node+0xbb/0xf0 [ 1120.312950] ? __kthread_create_on_node+0x410/0x410 [ 1120.353970] ? check_preemption_disabled+0x41/0x280 [ 1120.358992] ? init_rescuer+0xa1/0x370 [ 1120.362882] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.367895] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 1120.373166] init_rescuer+0x1f7/0x370 [ 1120.376971] __alloc_workqueue_key+0xb56/0xed0 [ 1120.381567] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1120.386617] ext4_fill_super+0x6edb/0xc820 [ 1120.391003] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1120.396106] ? snprintf+0xbb/0xf0 [ 1120.399555] ? wait_for_completion_io+0x10/0x10 [ 1120.404226] ? set_blocksize+0x163/0x3f0 [ 1120.408307] mount_bdev+0x2fc/0x3b0 [ 1120.411923] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1120.417029] mount_fs+0xa3/0x30c [ 1120.420391] vfs_kern_mount.part.0+0x68/0x470 [ 1120.424897] do_mount+0x113c/0x2f10 [ 1120.428526] ? lock_acquire+0x170/0x3c0 [ 1120.432599] ? check_preemption_disabled+0x41/0x280 [ 1120.437608] ? copy_mount_string+0x40/0x40 [ 1120.441835] ? copy_mount_options+0x59/0x380 [ 1120.446247] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.451261] ? kmem_cache_alloc_trace+0x323/0x380 [ 1120.456096] ? copy_mount_options+0x26f/0x380 [ 1120.460578] ksys_mount+0xcf/0x130 [ 1120.464121] __x64_sys_mount+0xba/0x150 [ 1120.468106] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1120.472676] do_syscall_64+0xf9/0x620 [ 1120.476465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.481638] RIP: 0033:0x46090a 21:06:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1120.484835] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1120.503747] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1120.511461] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1120.518893] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1120.526170] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1120.533439] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1120.540701] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1120.555225] EXT4-fs: failed to create workqueue [ 1120.560012] EXT4-fs (loop5): mount failed 21:06:58 executing program 5 (fault-call:3 fault-nth:77): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:06:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1120.698115] FAULT_INJECTION: forcing a failure. [ 1120.698115] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.715648] CPU: 0 PID: 8688 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1120.723486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.732853] Call Trace: [ 1120.735459] dump_stack+0x1fc/0x2fe [ 1120.739102] should_fail.cold+0xa/0x14 [ 1120.743010] ? setup_fault_attr+0x200/0x200 [ 1120.747340] ? lock_acquire+0x170/0x3c0 [ 1120.751336] __should_failslab+0x115/0x180 [ 1120.755585] should_failslab+0x5/0xf [ 1120.759306] kmem_cache_alloc+0x277/0x370 [ 1120.763466] __d_alloc+0x2b/0xa10 [ 1120.766939] d_make_root+0x3e/0x90 [ 1120.770505] ext4_fill_super+0x706e/0xc820 [ 1120.774782] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1120.779904] ? snprintf+0xbb/0xf0 [ 1120.783560] ? wait_for_completion_io+0x10/0x10 [ 1120.788248] ? set_blocksize+0x163/0x3f0 [ 1120.792328] mount_bdev+0x2fc/0x3b0 [ 1120.795971] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1120.801099] mount_fs+0xa3/0x30c [ 1120.804491] vfs_kern_mount.part.0+0x68/0x470 [ 1120.809026] do_mount+0x113c/0x2f10 [ 1120.812671] ? lock_acquire+0x170/0x3c0 [ 1120.816637] ? check_preemption_disabled+0x41/0x280 [ 1120.821654] ? copy_mount_string+0x40/0x40 [ 1120.825883] ? copy_mount_options+0x59/0x380 [ 1120.830282] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.835286] ? kmem_cache_alloc_trace+0x323/0x380 [ 1120.840117] ? copy_mount_options+0x26f/0x380 [ 1120.844602] ksys_mount+0xcf/0x130 [ 1120.848131] __x64_sys_mount+0xba/0x150 [ 1120.852096] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1120.856663] do_syscall_64+0xf9/0x620 [ 1120.860467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.865651] RIP: 0033:0x46090a [ 1120.868837] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1120.887735] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1120.895435] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1120.902691] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1120.909948] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1120.917201] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1120.924468] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:06:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1120.947846] EXT4-fs (loop5): get root dentry failed [ 1120.954104] EXT4-fs (loop5): mount failed [ 1120.973626] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:06:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x20000000, 0x0) 21:06:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d79", 0x39}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:06:58 executing program 5 (fault-call:3 fault-nth:78): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1121.128545] FAULT_INJECTION: forcing a failure. [ 1121.128545] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.152128] CPU: 0 PID: 8723 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1121.159959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.169321] Call Trace: [ 1121.171916] dump_stack+0x1fc/0x2fe [ 1121.175546] should_fail.cold+0xa/0x14 [ 1121.179444] ? setup_fault_attr+0x200/0x200 [ 1121.183775] ? lock_acquire+0x170/0x3c0 [ 1121.187773] __should_failslab+0x115/0x180 [ 1121.192031] should_failslab+0x5/0xf [ 1121.195750] kmem_cache_alloc_trace+0x284/0x380 [ 1121.200433] apply_wqattrs_prepare+0x1c4/0xa50 [ 1121.205037] apply_workqueue_attrs_locked+0xc5/0x120 [ 1121.210156] __alloc_workqueue_key+0x510/0xed0 [ 1121.214762] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1121.219818] ext4_fill_super+0x6edb/0xc820 [ 1121.224096] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1121.229212] ? snprintf+0xbb/0xf0 [ 1121.232684] ? wait_for_completion_io+0x10/0x10 [ 1121.237357] ? set_blocksize+0x163/0x3f0 [ 1121.241436] mount_bdev+0x2fc/0x3b0 [ 1121.245075] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1121.250189] mount_fs+0xa3/0x30c [ 1121.253569] vfs_kern_mount.part.0+0x68/0x470 [ 1121.258078] do_mount+0x113c/0x2f10 [ 1121.261726] ? do_raw_spin_unlock+0x171/0x230 [ 1121.266234] ? check_preemption_disabled+0x41/0x280 [ 1121.271262] ? copy_mount_string+0x40/0x40 [ 1121.275509] ? copy_mount_options+0x59/0x380 [ 1121.279932] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1121.284957] ? kmem_cache_alloc_trace+0x323/0x380 [ 1121.289805] ? copy_mount_options+0x26f/0x380 [ 1121.294299] ksys_mount+0xcf/0x130 [ 1121.297830] __x64_sys_mount+0xba/0x150 [ 1121.301798] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1121.306366] do_syscall_64+0xf9/0x620 [ 1121.310153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.315328] RIP: 0033:0x46090a [ 1121.318506] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1121.337393] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1121.345098] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1121.352372] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1121.359649] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1121.366904] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1121.374157] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1121.385640] EXT4-fs: failed to create workqueue [ 1121.390409] EXT4-fs (loop5): mount failed 21:07:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed06", 0x2e}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:00 executing program 5 (fault-call:3 fault-nth:79): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1123.278287] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1123.283102] FAULT_INJECTION: forcing a failure. [ 1123.283102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1123.299612] CPU: 0 PID: 8743 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1123.307420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.317223] Call Trace: [ 1123.319824] dump_stack+0x1fc/0x2fe [ 1123.323470] should_fail.cold+0xa/0x14 [ 1123.327380] ? setup_fault_attr+0x200/0x200 [ 1123.331715] ? __lock_acquire+0x6de/0x3ff0 [ 1123.335968] ? mark_held_locks+0xf0/0xf0 [ 1123.340040] __alloc_pages_nodemask+0x239/0x2890 [ 1123.344793] ? __lock_acquire+0x6de/0x3ff0 [ 1123.349034] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1123.353925] ? __lock_acquire+0x6de/0x3ff0 [ 1123.358170] ? __cpu_to_node+0x7b/0xa0 [ 1123.362061] ? mark_held_locks+0xf0/0xf0 [ 1123.366359] ? update_curr+0x28d/0x870 [ 1123.370275] cache_grow_begin+0xa4/0x8a0 [ 1123.374339] ? setup_fault_attr+0x200/0x200 [ 1123.378650] cache_alloc_refill+0x273/0x340 [ 1123.382977] kmem_cache_alloc+0x346/0x370 [ 1123.387118] ? ext4_sync_fs+0x8d0/0x8d0 [ 1123.391077] ext4_alloc_inode+0x1a/0x630 [ 1123.395131] ? ext4_sync_fs+0x8d0/0x8d0 [ 1123.399154] alloc_inode+0x5d/0x180 [ 1123.402781] iget_locked+0x193/0x480 [ 1123.406484] __ext4_iget+0x279/0x3e00 [ 1123.410278] ? __alloc_workqueue_key+0x92d/0xed0 [ 1123.415034] ? ext4_get_projid+0x190/0x190 [ 1123.419264] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1123.424289] ext4_fill_super+0x6f83/0xc820 [ 1123.428562] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1123.433681] ? snprintf+0xbb/0xf0 [ 1123.437137] ? wait_for_completion_io+0x10/0x10 [ 1123.441810] ? set_blocksize+0x163/0x3f0 [ 1123.445894] mount_bdev+0x2fc/0x3b0 [ 1123.449521] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1123.454620] mount_fs+0xa3/0x30c [ 1123.457996] vfs_kern_mount.part.0+0x68/0x470 [ 1123.462485] do_mount+0x113c/0x2f10 [ 1123.466145] ? lock_acquire+0x170/0x3c0 [ 1123.470110] ? check_preemption_disabled+0x41/0x280 [ 1123.475116] ? copy_mount_string+0x40/0x40 [ 1123.479339] ? copy_mount_options+0x59/0x380 [ 1123.483755] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.488776] ? kmem_cache_alloc_trace+0x323/0x380 [ 1123.493736] ? copy_mount_options+0x26f/0x380 [ 1123.498228] ksys_mount+0xcf/0x130 [ 1123.501759] __x64_sys_mount+0xba/0x150 [ 1123.505737] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1123.510309] do_syscall_64+0xf9/0x620 [ 1123.514101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.519273] RIP: 0033:0x46090a [ 1123.522469] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1123.541360] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1123.549111] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1123.556406] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1123.563700] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1123.570967] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 21:07:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:01 executing program 5 (fault-call:3 fault-nth:80): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1123.578233] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1123.604013] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:07:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1123.718493] FAULT_INJECTION: forcing a failure. [ 1123.718493] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.738453] CPU: 0 PID: 8767 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1123.746307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.755672] Call Trace: [ 1123.758281] dump_stack+0x1fc/0x2fe [ 1123.761928] should_fail.cold+0xa/0x14 [ 1123.765835] ? setup_fault_attr+0x200/0x200 [ 1123.770170] ? __lock_acquire+0x6de/0x3ff0 [ 1123.774441] __should_failslab+0x115/0x180 [ 1123.778684] should_failslab+0x5/0xf [ 1123.782408] kmem_cache_alloc+0x3f/0x370 [ 1123.786484] ? mempool_alloc+0x350/0x350 [ 1123.790568] mempool_alloc+0x146/0x350 [ 1123.794471] ? mark_held_locks+0xf0/0xf0 [ 1123.798544] ? mempool_resize+0x790/0x790 [ 1123.802717] ? kernel_fpu_enable+0x1f/0x40 [ 1123.806964] ? kernel_fpu_end+0x11b/0x170 [ 1123.811137] ? kernel_fpu_enable+0x40/0x40 [ 1123.815401] ? locked_inode_to_wb_and_lock_list+0x1d9/0x980 [ 1123.821131] bio_alloc_bioset+0x389/0x5e0 [ 1123.825477] ? bvec_alloc+0x2f0/0x2f0 [ 1123.829273] ? mark_held_locks+0xa6/0xf0 [ 1123.833417] ? __local_bh_enable_ip+0x159/0x270 [ 1123.838097] submit_bh_wbc+0x141/0x760 [ 1123.842120] __sync_dirty_buffer+0x14e/0x320 [ 1123.846530] ext4_commit_super+0x771/0xb70 [ 1123.850767] ext4_setup_super+0x584/0x9f0 [ 1123.854915] ext4_fill_super+0x70cd/0xc820 [ 1123.859322] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1123.864426] ? snprintf+0xbb/0xf0 [ 1123.867878] ? wait_for_completion_io+0x10/0x10 [ 1123.872552] ? set_blocksize+0x163/0x3f0 [ 1123.876623] mount_bdev+0x2fc/0x3b0 [ 1123.880255] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1123.885368] mount_fs+0xa3/0x30c [ 1123.888748] vfs_kern_mount.part.0+0x68/0x470 [ 1123.893251] do_mount+0x113c/0x2f10 [ 1123.896881] ? copy_mount_string+0x40/0x40 [ 1123.901201] ? copy_mount_options+0x1da/0x380 [ 1123.905689] ? copy_mount_options+0x1e9/0x380 [ 1123.910173] ? copy_mount_options+0x26f/0x380 [ 1123.914665] ksys_mount+0xcf/0x130 [ 1123.918196] __x64_sys_mount+0xba/0x150 [ 1123.922156] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1123.926725] do_syscall_64+0xf9/0x620 [ 1123.930514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.935689] RIP: 0033:0x46090a [ 1123.938886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1123.957794] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1123.965632] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1123.972912] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1123.980192] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1123.987457] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1123.994728] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:01 executing program 5 (fault-call:3 fault-nth:81): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1124.017550] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1124.030326] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:07:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x21000000, 0x0) 21:07:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d79", 0x39}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1124.196946] FAULT_INJECTION: forcing a failure. [ 1124.196946] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.210098] CPU: 1 PID: 8792 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1124.217914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.227276] Call Trace: [ 1124.229877] dump_stack+0x1fc/0x2fe [ 1124.233518] should_fail.cold+0xa/0x14 [ 1124.237417] ? setup_fault_attr+0x200/0x200 [ 1124.241738] ? lock_acquire+0x170/0x3c0 [ 1124.245760] __should_failslab+0x115/0x180 [ 1124.249989] should_failslab+0x5/0xf [ 1124.253693] kmem_cache_alloc+0x277/0x370 [ 1124.257834] add_system_zone+0x10a/0x4e0 [ 1124.261888] ext4_setup_system_zone+0x366/0xac0 [ 1124.266548] ? ext4_commit_super+0x6f1/0xb70 [ 1124.270940] ? ext4_exit_system_zone+0x20/0x20 [ 1124.275511] ? ext4_setup_super+0x5f3/0x9f0 [ 1124.279827] ext4_fill_super+0x72e0/0xc820 [ 1124.284092] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1124.289184] ? snprintf+0xbb/0xf0 [ 1124.292625] ? wait_for_completion_io+0x10/0x10 [ 1124.297277] ? set_blocksize+0x163/0x3f0 [ 1124.301331] mount_bdev+0x2fc/0x3b0 [ 1124.304943] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1124.310049] mount_fs+0xa3/0x30c [ 1124.313407] vfs_kern_mount.part.0+0x68/0x470 [ 1124.317888] do_mount+0x113c/0x2f10 [ 1124.321502] ? lock_acquire+0x170/0x3c0 [ 1124.325491] ? check_preemption_disabled+0x41/0x280 [ 1124.330498] ? copy_mount_string+0x40/0x40 [ 1124.334721] ? copy_mount_options+0x59/0x380 [ 1124.339137] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.344148] ? kmem_cache_alloc_trace+0x323/0x380 [ 1124.348975] ? copy_mount_options+0x26f/0x380 [ 1124.353459] ksys_mount+0xcf/0x130 [ 1124.356982] __x64_sys_mount+0xba/0x150 [ 1124.360938] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1124.365513] do_syscall_64+0xf9/0x620 [ 1124.369301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.374492] RIP: 0033:0x46090a [ 1124.377668] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1124.396552] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1124.404264] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1124.411519] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1124.418772] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1124.426044] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1124.433306] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1124.443569] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1124.545101] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:07:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b0", 0x31}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:03 executing program 5 (fault-call:3 fault-nth:82): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1126.301612] FAULT_INJECTION: forcing a failure. [ 1126.301612] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.318552] CPU: 0 PID: 8816 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1126.326387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.335755] Call Trace: [ 1126.338362] dump_stack+0x1fc/0x2fe [ 1126.342010] should_fail.cold+0xa/0x14 [ 1126.345910] ? setup_fault_attr+0x200/0x200 [ 1126.350251] ? lock_acquire+0x170/0x3c0 [ 1126.354235] __should_failslab+0x115/0x180 [ 1126.358461] should_failslab+0x5/0xf [ 1126.362164] kmem_cache_alloc_trace+0x284/0x380 [ 1126.366825] ext4_setup_system_zone+0x149/0xac0 [ 1126.371514] ? __sync_dirty_buffer+0x1ef/0x320 [ 1126.376086] ? ext4_commit_super+0x6f1/0xb70 [ 1126.380501] ? ext4_exit_system_zone+0x20/0x20 [ 1126.385072] ? ext4_setup_super+0x5f3/0x9f0 [ 1126.389381] ext4_fill_super+0x72e0/0xc820 [ 1126.393620] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1126.398710] ? snprintf+0xbb/0xf0 [ 1126.402170] ? wait_for_completion_io+0x10/0x10 [ 1126.406871] ? set_blocksize+0x163/0x3f0 [ 1126.410943] mount_bdev+0x2fc/0x3b0 [ 1126.414567] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1126.419678] mount_fs+0xa3/0x30c [ 1126.423050] vfs_kern_mount.part.0+0x68/0x470 [ 1126.427544] do_mount+0x113c/0x2f10 [ 1126.431166] ? lock_acquire+0x170/0x3c0 [ 1126.435132] ? check_preemption_disabled+0x41/0x280 [ 1126.440141] ? copy_mount_string+0x40/0x40 [ 1126.444367] ? copy_mount_options+0x59/0x380 [ 1126.448766] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.453772] ? kmem_cache_alloc_trace+0x323/0x380 [ 1126.458608] ? copy_mount_options+0x26f/0x380 [ 1126.463094] ksys_mount+0xcf/0x130 [ 1126.466622] __x64_sys_mount+0xba/0x150 [ 1126.470583] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1126.475151] do_syscall_64+0xf9/0x620 [ 1126.478943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.484118] RIP: 0033:0x46090a [ 1126.487295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1126.506283] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1126.513990] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1126.521264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1126.528541] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1126.535796] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1126.543066] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:04 executing program 5 (fault-call:3 fault-nth:83): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1126.555871] EXT4-fs (loop5): failed to initialize system zone (-12) [ 1126.563052] EXT4-fs (loop5): mount failed [ 1126.568199] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 21:07:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1126.684644] FAULT_INJECTION: forcing a failure. [ 1126.684644] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.697635] CPU: 0 PID: 8833 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1126.705453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.714820] Call Trace: [ 1126.717433] dump_stack+0x1fc/0x2fe [ 1126.721083] should_fail.cold+0xa/0x14 [ 1126.724988] ? setup_fault_attr+0x200/0x200 [ 1126.729319] ? mark_held_locks+0xf0/0xf0 [ 1126.733392] ? kasan_kmalloc+0x139/0x160 [ 1126.737468] __should_failslab+0x115/0x180 [ 1126.741716] should_failslab+0x5/0xf [ 1126.745438] kmem_cache_alloc+0x3f/0x370 [ 1126.749513] ? mempool_alloc+0x350/0x350 [ 1126.753588] mempool_alloc+0x146/0x350 [ 1126.757495] ? mempool_resize+0x790/0x790 [ 1126.761661] ? check_preemption_disabled+0x41/0x280 [ 1126.766692] ? find_get_entry+0x4f4/0x8a0 [ 1126.770853] bio_alloc_bioset+0x389/0x5e0 [ 1126.775014] ? __find_get_block+0x7a6/0xde0 [ 1126.779375] ? bvec_alloc+0x2f0/0x2f0 [ 1126.783297] ? lock_downgrade+0x720/0x720 [ 1126.787465] submit_bh_wbc+0x141/0x760 [ 1126.791372] ll_rw_block+0x1ed/0x220 [ 1126.795099] __breadahead_gfp+0xb8/0x130 [ 1126.799175] ? __breadahead+0x130/0x130 [ 1126.802040] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 1126.803166] __ext4_get_inode_loc+0xc16/0x10f0 [ 1126.803191] ? iget_locked+0x154/0x480 [ 1126.820473] __ext4_iget+0x2ef/0x3e00 [ 1126.824282] ? __alloc_workqueue_key+0x92d/0xed0 [ 1126.829051] ? ext4_get_projid+0x190/0x190 [ 1126.833317] ext4_fill_super+0x6f83/0xc820 [ 1126.837594] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1126.842722] ? snprintf+0xbb/0xf0 [ 1126.846177] ? wait_for_completion_io+0x10/0x10 [ 1126.850835] ? set_blocksize+0x163/0x3f0 [ 1126.854906] mount_bdev+0x2fc/0x3b0 [ 1126.858568] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1126.863668] mount_fs+0xa3/0x30c [ 1126.867032] vfs_kern_mount.part.0+0x68/0x470 [ 1126.871539] do_mount+0x113c/0x2f10 [ 1126.875189] ? do_raw_spin_unlock+0x171/0x230 [ 1126.879683] ? check_preemption_disabled+0x41/0x280 [ 1126.884705] ? copy_mount_string+0x40/0x40 [ 1126.888942] ? copy_mount_options+0x59/0x380 [ 1126.893353] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.898450] ? kmem_cache_alloc_trace+0x323/0x380 [ 1126.903293] ? copy_mount_options+0x26f/0x380 [ 1126.907786] ksys_mount+0xcf/0x130 [ 1126.911358] __x64_sys_mount+0xba/0x150 [ 1126.915350] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1126.919933] do_syscall_64+0xf9/0x620 [ 1126.923723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.928899] RIP: 0033:0x46090a [ 1126.932090] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1126.950990] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1126.958966] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1126.966227] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1126.973595] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 21:07:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:04 executing program 5 (fault-call:3 fault-nth:84): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1126.980895] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1126.988161] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1127.009483] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:07:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1127.136254] FAULT_INJECTION: forcing a failure. [ 1127.136254] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.148095] CPU: 0 PID: 8854 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1127.155909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.165271] Call Trace: [ 1127.167871] dump_stack+0x1fc/0x2fe [ 1127.171514] should_fail.cold+0xa/0x14 [ 1127.175410] ? setup_fault_attr+0x200/0x200 [ 1127.179743] ? lock_acquire+0x170/0x3c0 [ 1127.180866] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1127.183729] __should_failslab+0x115/0x180 [ 1127.183745] should_failslab+0x5/0xf [ 1127.183757] kmem_cache_alloc+0x277/0x370 [ 1127.183772] add_system_zone+0x10a/0x4e0 [ 1127.183789] ext4_setup_system_zone+0x396/0xac0 [ 1127.210468] ? ext4_commit_super+0x6f1/0xb70 [ 1127.214874] ? ext4_exit_system_zone+0x20/0x20 [ 1127.219452] ? ext4_setup_super+0x5f3/0x9f0 [ 1127.223759] ext4_fill_super+0x72e0/0xc820 [ 1127.227989] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1127.233260] ? snprintf+0xbb/0xf0 [ 1127.236844] ? wait_for_completion_io+0x10/0x10 [ 1127.241510] ? set_blocksize+0x163/0x3f0 [ 1127.245601] mount_bdev+0x2fc/0x3b0 [ 1127.249240] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1127.254354] mount_fs+0xa3/0x30c [ 1127.257722] vfs_kern_mount.part.0+0x68/0x470 [ 1127.262204] do_mount+0x113c/0x2f10 [ 1127.265921] ? lock_acquire+0x170/0x3c0 [ 1127.269893] ? check_preemption_disabled+0x41/0x280 [ 1127.274915] ? copy_mount_string+0x40/0x40 [ 1127.279150] ? copy_mount_options+0x59/0x380 [ 1127.283603] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1127.288604] ? kmem_cache_alloc_trace+0x323/0x380 [ 1127.293450] ? copy_mount_options+0x26f/0x380 [ 1127.297940] ksys_mount+0xcf/0x130 [ 1127.301473] __x64_sys_mount+0xba/0x150 [ 1127.305433] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1127.309996] do_syscall_64+0xf9/0x620 [ 1127.313792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.318974] RIP: 0033:0x46090a 21:07:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d79", 0x39}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1127.322148] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1127.341159] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1127.348866] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1127.356131] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1127.363514] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1127.370790] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1127.378053] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xf6ffffff, 0x0) [ 1127.401679] EXT4-fs (loop5): failed to initialize system zone (-12) [ 1127.413302] EXT4-fs (loop5): mount failed 21:07:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfeffffff, 0x0) 21:07:04 executing program 5 (fault-call:3 fault-nth:85): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1127.565412] FAULT_INJECTION: forcing a failure. [ 1127.565412] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.577446] CPU: 0 PID: 8885 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1127.585265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.594630] Call Trace: [ 1127.597239] dump_stack+0x1fc/0x2fe [ 1127.600882] should_fail.cold+0xa/0x14 [ 1127.604776] ? setup_fault_attr+0x200/0x200 [ 1127.609103] ? finish_task_switch+0x146/0x780 [ 1127.613622] __should_failslab+0x115/0x180 [ 1127.617863] should_failslab+0x5/0xf [ 1127.621582] kmem_cache_alloc+0x3f/0x370 [ 1127.625650] ? mempool_alloc+0x350/0x350 [ 1127.629717] mempool_alloc+0x146/0x350 [ 1127.633615] ? mempool_resize+0x790/0x790 [ 1127.637768] ? __schedule+0x88f/0x2040 [ 1127.641677] ? io_schedule_timeout+0x140/0x140 [ 1127.646272] bio_alloc_bioset+0x389/0x5e0 [ 1127.650525] ? ___preempt_schedule+0x16/0x18 [ 1127.654951] ? preempt_schedule_common+0x45/0xc0 [ 1127.659753] ? bvec_alloc+0x2f0/0x2f0 [ 1127.663676] ? ___preempt_schedule+0x16/0x18 [ 1127.668109] submit_bh_wbc+0x141/0x760 [ 1127.672010] __sync_dirty_buffer+0x14e/0x320 [ 1127.676423] ext4_commit_super+0x771/0xb70 [ 1127.680737] ext4_setup_super+0x584/0x9f0 [ 1127.684992] ext4_fill_super+0x70cd/0xc820 [ 1127.689371] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1127.694481] ? snprintf+0xbb/0xf0 [ 1127.697937] ? wait_for_completion_io+0x10/0x10 [ 1127.702606] ? set_blocksize+0x163/0x3f0 [ 1127.706667] mount_bdev+0x2fc/0x3b0 [ 1127.710333] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1127.715431] mount_fs+0xa3/0x30c [ 1127.718791] vfs_kern_mount.part.0+0x68/0x470 [ 1127.723300] do_mount+0x113c/0x2f10 [ 1127.726979] ? copy_mount_string+0x40/0x40 [ 1127.731208] ? copy_mount_options+0x1da/0x380 [ 1127.735747] ? copy_mount_options+0x1ef/0x380 [ 1127.740248] ? copy_mount_options+0x26f/0x380 [ 1127.744837] ksys_mount+0xcf/0x130 [ 1127.748396] __x64_sys_mount+0xba/0x150 [ 1127.752370] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1127.756973] do_syscall_64+0xf9/0x620 [ 1127.760793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.765967] RIP: 0033:0x46090a [ 1127.769143] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1127.788048] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1127.795770] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1127.803042] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1127.810303] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1127.817557] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1127.824810] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1127.837626] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:07:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b0", 0x31}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:06 executing program 5 (fault-call:3 fault-nth:86): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1129.320424] FAULT_INJECTION: forcing a failure. [ 1129.320424] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.339147] CPU: 0 PID: 8898 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1129.346974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.356323] Call Trace: [ 1129.358904] dump_stack+0x1fc/0x2fe [ 1129.362526] should_fail.cold+0xa/0x14 [ 1129.366402] ? setup_fault_attr+0x200/0x200 [ 1129.370709] ? lock_acquire+0x170/0x3c0 [ 1129.374678] __should_failslab+0x115/0x180 [ 1129.378900] should_failslab+0x5/0xf [ 1129.382626] kmem_cache_alloc+0x277/0x370 [ 1129.386761] add_system_zone+0x10a/0x4e0 [ 1129.390809] ext4_setup_system_zone+0x396/0xac0 [ 1129.395473] ? ext4_commit_super+0x6f1/0xb70 [ 1129.399869] ? ext4_exit_system_zone+0x20/0x20 [ 1129.404440] ? ext4_setup_super+0x5f3/0x9f0 [ 1129.408753] ext4_fill_super+0x72e0/0xc820 [ 1129.412996] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1129.418087] ? snprintf+0xbb/0xf0 [ 1129.421529] ? wait_for_completion_io+0x10/0x10 [ 1129.426183] ? set_blocksize+0x163/0x3f0 [ 1129.430236] mount_bdev+0x2fc/0x3b0 [ 1129.433851] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1129.438957] mount_fs+0xa3/0x30c [ 1129.442313] vfs_kern_mount.part.0+0x68/0x470 [ 1129.446795] do_mount+0x113c/0x2f10 [ 1129.450409] ? lock_acquire+0x170/0x3c0 [ 1129.454369] ? check_preemption_disabled+0x41/0x280 [ 1129.459372] ? copy_mount_string+0x40/0x40 [ 1129.463605] ? copy_mount_options+0x59/0x380 [ 1129.468019] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1129.473031] ? kmem_cache_alloc_trace+0x323/0x380 [ 1129.477873] ? copy_mount_options+0x26f/0x380 [ 1129.482364] ksys_mount+0xcf/0x130 [ 1129.485900] __x64_sys_mount+0xba/0x150 [ 1129.489869] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1129.494443] do_syscall_64+0xf9/0x620 [ 1129.498235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.503406] RIP: 0033:0x46090a [ 1129.506584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1129.525471] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1129.533169] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1129.540439] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1129.547697] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1129.554970] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1129.562225] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:07 executing program 5 (fault-call:3 fault-nth:87): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1129.580186] EXT4-fs (loop5): failed to initialize system zone (-12) [ 1129.587442] EXT4-fs (loop5): mount failed [ 1129.603293] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1129.730422] FAULT_INJECTION: forcing a failure. [ 1129.730422] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.742262] CPU: 0 PID: 8916 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1129.750078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.759438] Call Trace: [ 1129.762038] dump_stack+0x1fc/0x2fe [ 1129.765669] should_fail.cold+0xa/0x14 [ 1129.769557] ? setup_fault_attr+0x200/0x200 [ 1129.773898] ? __kmalloc_node+0x38/0x70 [ 1129.777864] __should_failslab+0x115/0x180 [ 1129.782206] should_failslab+0x5/0xf [ 1129.785918] kmem_cache_alloc+0x277/0x370 [ 1129.790056] ? ext4_sync_fs+0x8d0/0x8d0 [ 1129.794035] ext4_alloc_inode+0x1a/0x630 [ 1129.798096] ? ext4_sync_fs+0x8d0/0x8d0 [ 1129.802073] alloc_inode+0x5d/0x180 [ 1129.805702] new_inode+0x1d/0xf0 [ 1129.809061] ext4_mb_init+0xa89/0x1790 [ 1129.812940] ext4_fill_super+0x7308/0xc820 [ 1129.817194] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1129.822331] ? snprintf+0xbb/0xf0 [ 1129.825787] ? wait_for_completion_io+0x10/0x10 [ 1129.830443] ? set_blocksize+0x163/0x3f0 [ 1129.834497] mount_bdev+0x2fc/0x3b0 [ 1129.838126] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1129.843244] mount_fs+0xa3/0x30c [ 1129.846610] vfs_kern_mount.part.0+0x68/0x470 [ 1129.851108] do_mount+0x113c/0x2f10 [ 1129.854746] ? lock_acquire+0x170/0x3c0 [ 1129.858715] ? check_preemption_disabled+0x41/0x280 [ 1129.863731] ? copy_mount_string+0x40/0x40 [ 1129.867967] ? copy_mount_options+0x59/0x380 [ 1129.872370] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1129.877376] ? kmem_cache_alloc_trace+0x323/0x380 [ 1129.882226] ? copy_mount_options+0x26f/0x380 [ 1129.886722] ksys_mount+0xcf/0x130 [ 1129.890261] __x64_sys_mount+0xba/0x150 [ 1129.894232] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1129.898798] do_syscall_64+0xf9/0x620 [ 1129.902598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.907792] RIP: 0033:0x46090a [ 1129.910971] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 21:07:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1129.929859] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1129.937557] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1129.944829] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1129.952101] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1129.959362] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1129.966621] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1129.981299] EXT4-fs (loop5): can't get new inode [ 1129.986133] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1129.995721] EXT4-fs (loop5): mount failed 21:07:07 executing program 5 (fault-call:3 fault-nth:88): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1130.061560] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:07:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1130.136780] FAULT_INJECTION: forcing a failure. [ 1130.136780] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.170242] CPU: 1 PID: 8930 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1130.174205] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1130.178073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.178079] Call Trace: [ 1130.178102] dump_stack+0x1fc/0x2fe [ 1130.178124] should_fail.cold+0xa/0x14 [ 1130.178140] ? setup_fault_attr+0x200/0x200 [ 1130.207803] ? lock_acquire+0x170/0x3c0 [ 1130.211792] __should_failslab+0x115/0x180 [ 1130.216096] should_failslab+0x5/0xf [ 1130.219805] kmem_cache_alloc+0x277/0x370 [ 1130.223959] add_system_zone+0x10a/0x4e0 [ 1130.228031] ext4_setup_system_zone+0x366/0xac0 [ 1130.232700] ? ext4_commit_super+0x6f1/0xb70 [ 1130.237117] ? ext4_exit_system_zone+0x20/0x20 [ 1130.241696] ? ext4_setup_super+0x5f3/0x9f0 [ 1130.246003] ext4_fill_super+0x72e0/0xc820 [ 1130.250254] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1130.255377] ? snprintf+0xbb/0xf0 [ 1130.258838] ? wait_for_completion_io+0x10/0x10 [ 1130.263511] ? set_blocksize+0x163/0x3f0 [ 1130.267590] mount_bdev+0x2fc/0x3b0 [ 1130.271286] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1130.276395] mount_fs+0xa3/0x30c [ 1130.279921] vfs_kern_mount.part.0+0x68/0x470 [ 1130.284538] do_mount+0x113c/0x2f10 [ 1130.288214] ? do_raw_spin_unlock+0x171/0x230 [ 1130.292700] ? check_preemption_disabled+0x41/0x280 [ 1130.297711] ? copy_mount_string+0x40/0x40 [ 1130.301949] ? copy_mount_options+0x59/0x380 [ 1130.306358] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1130.311374] ? kmem_cache_alloc_trace+0x323/0x380 [ 1130.316223] ? copy_mount_options+0x26f/0x380 [ 1130.320846] ksys_mount+0xcf/0x130 [ 1130.324386] __x64_sys_mount+0xba/0x150 [ 1130.328357] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1130.332955] do_syscall_64+0xf9/0x620 [ 1130.336766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.341961] RIP: 0033:0x46090a [ 1130.345150] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1130.364142] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1130.371947] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1130.379219] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1130.386484] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1130.393757] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1130.401033] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1130.409469] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:07:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:07 executing program 5 (fault-call:3 fault-nth:89): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xff600000, 0x0) 21:07:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1130.555829] FAULT_INJECTION: forcing a failure. [ 1130.555829] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.576408] CPU: 1 PID: 8954 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1130.584247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.593610] Call Trace: [ 1130.596216] dump_stack+0x1fc/0x2fe [ 1130.599858] should_fail.cold+0xa/0x14 [ 1130.603832] ? setup_fault_attr+0x200/0x200 [ 1130.608139] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1130.613246] __should_failslab+0x115/0x180 [ 1130.617488] should_failslab+0x5/0xf [ 1130.621198] __kmalloc+0x2ab/0x3c0 [ 1130.624729] ? ext4_mb_add_groupinfo+0x160/0xe90 [ 1130.629470] ext4_mb_add_groupinfo+0x160/0xe90 [ 1130.634115] ? ext4_get_group_desc+0x29c/0x4e0 [ 1130.638697] ext4_mb_init+0xb58/0x1790 [ 1130.642574] ext4_fill_super+0x7308/0xc820 [ 1130.646805] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1130.651907] ? snprintf+0xbb/0xf0 [ 1130.655354] ? wait_for_completion_io+0x10/0x10 [ 1130.660013] ? set_blocksize+0x163/0x3f0 [ 1130.664077] mount_bdev+0x2fc/0x3b0 [ 1130.667712] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1130.672810] mount_fs+0xa3/0x30c [ 1130.676162] vfs_kern_mount.part.0+0x68/0x470 [ 1130.680712] do_mount+0x113c/0x2f10 [ 1130.684348] ? lock_acquire+0x170/0x3c0 [ 1130.688316] ? check_preemption_disabled+0x41/0x280 [ 1130.693319] ? copy_mount_string+0x40/0x40 [ 1130.697599] ? copy_mount_options+0x59/0x380 [ 1130.701993] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1130.707086] ? kmem_cache_alloc_trace+0x323/0x380 [ 1130.711943] ? copy_mount_options+0x26f/0x380 [ 1130.716449] ksys_mount+0xcf/0x130 [ 1130.719990] __x64_sys_mount+0xba/0x150 [ 1130.723957] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1130.728538] do_syscall_64+0xf9/0x620 [ 1130.732349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.737543] RIP: 0033:0x46090a [ 1130.740759] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1130.759647] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1130.767343] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1130.774597] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1130.781859] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1130.789126] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1130.796402] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1130.807260] EXT4-fs (loop5): can't allocate mem for a buddy group [ 1130.813731] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1130.820446] EXT4-fs (loop5): mount failed [ 1130.880826] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:07:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b0", 0x31}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:09 executing program 5 (fault-call:3 fault-nth:90): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1132.341293] FAULT_INJECTION: forcing a failure. [ 1132.341293] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.356847] CPU: 0 PID: 8978 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1132.364691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.374055] Call Trace: [ 1132.376657] dump_stack+0x1fc/0x2fe [ 1132.380304] should_fail.cold+0xa/0x14 [ 1132.384207] ? setup_fault_attr+0x200/0x200 [ 1132.388532] ? lock_acquire+0x170/0x3c0 [ 1132.392504] __should_failslab+0x115/0x180 [ 1132.396862] should_failslab+0x5/0xf [ 1132.400568] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1132.405678] __kmalloc_node+0x38/0x70 [ 1132.409473] kvmalloc_node+0x61/0xf0 [ 1132.413182] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 1132.418061] ext4_mb_init+0x985/0x1790 [ 1132.421951] ext4_fill_super+0x7308/0xc820 [ 1132.426197] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1132.431297] ? snprintf+0xbb/0xf0 [ 1132.434745] ? wait_for_completion_io+0x10/0x10 [ 1132.439401] ? set_blocksize+0x163/0x3f0 [ 1132.443457] mount_bdev+0x2fc/0x3b0 [ 1132.447069] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1132.452174] mount_fs+0xa3/0x30c [ 1132.455556] vfs_kern_mount.part.0+0x68/0x470 [ 1132.460054] do_mount+0x113c/0x2f10 [ 1132.463674] ? lock_acquire+0x170/0x3c0 [ 1132.467636] ? check_preemption_disabled+0x41/0x280 [ 1132.472639] ? copy_mount_string+0x40/0x40 [ 1132.476859] ? copy_mount_options+0x59/0x380 [ 1132.481259] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1132.486268] ? kmem_cache_alloc_trace+0x323/0x380 [ 1132.491101] ? copy_mount_options+0x26f/0x380 [ 1132.495599] ksys_mount+0xcf/0x130 [ 1132.499126] __x64_sys_mount+0xba/0x150 [ 1132.503088] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1132.507654] do_syscall_64+0xf9/0x620 [ 1132.511450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.516623] RIP: 0033:0x46090a [ 1132.519802] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1132.538703] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1132.546418] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1132.553681] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1132.560944] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1132.568198] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1132.575450] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1132.587456] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1132.617721] EXT4-fs (loop5): can't allocate buddy meta group [ 1132.624548] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1132.630737] EXT4-fs (loop5): mount failed 21:07:10 executing program 5 (fault-call:3 fault-nth:91): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1132.743844] FAULT_INJECTION: forcing a failure. [ 1132.743844] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.766027] CPU: 1 PID: 8996 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1132.773905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.783261] Call Trace: [ 1132.785843] dump_stack+0x1fc/0x2fe [ 1132.789457] should_fail.cold+0xa/0x14 [ 1132.793332] ? setup_fault_attr+0x200/0x200 [ 1132.797749] ? __kmalloc_node+0x38/0x70 [ 1132.801742] __should_failslab+0x115/0x180 [ 1132.805973] should_failslab+0x5/0xf [ 1132.809672] kmem_cache_alloc+0x277/0x370 [ 1132.813807] ? ext4_sync_fs+0x8d0/0x8d0 [ 1132.817765] ext4_alloc_inode+0x1a/0x630 [ 1132.821822] ? ext4_sync_fs+0x8d0/0x8d0 [ 1132.825791] alloc_inode+0x5d/0x180 [ 1132.829415] new_inode+0x1d/0xf0 [ 1132.832939] ext4_mb_init+0xa89/0x1790 [ 1132.836828] ext4_fill_super+0x7308/0xc820 [ 1132.841066] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1132.846180] ? snprintf+0xbb/0xf0 [ 1132.849631] ? wait_for_completion_io+0x10/0x10 [ 1132.854416] ? set_blocksize+0x163/0x3f0 [ 1132.858609] mount_bdev+0x2fc/0x3b0 [ 1132.862228] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1132.867329] mount_fs+0xa3/0x30c [ 1132.870700] vfs_kern_mount.part.0+0x68/0x470 [ 1132.875194] do_mount+0x113c/0x2f10 [ 1132.878831] ? lock_acquire+0x170/0x3c0 [ 1132.882916] ? check_preemption_disabled+0x41/0x280 [ 1132.887928] ? copy_mount_string+0x40/0x40 [ 1132.892180] ? copy_mount_options+0x59/0x380 [ 1132.896592] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1132.901595] ? kmem_cache_alloc_trace+0x323/0x380 [ 1132.906453] ? copy_mount_options+0x26f/0x380 [ 1132.910942] ksys_mount+0xcf/0x130 [ 1132.914470] __x64_sys_mount+0xba/0x150 [ 1132.918433] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1132.923006] do_syscall_64+0xf9/0x620 [ 1132.926810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.931983] RIP: 0033:0x46090a [ 1132.935174] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1132.954061] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1132.961764] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1132.969036] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1132.976443] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1132.983706] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 21:07:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1132.990967] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1133.011473] EXT4-fs (loop5): can't get new inode [ 1133.045757] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1133.056167] EXT4-fs (loop5): mount failed 21:07:10 executing program 5 (fault-call:3 fault-nth:92): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1133.149687] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1133.209378] FAULT_INJECTION: forcing a failure. [ 1133.209378] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.229755] CPU: 1 PID: 9013 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1133.237588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.246951] Call Trace: [ 1133.249559] dump_stack+0x1fc/0x2fe [ 1133.253198] should_fail.cold+0xa/0x14 21:07:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1133.257103] ? setup_fault_attr+0x200/0x200 [ 1133.261436] ? lock_acquire+0x170/0x3c0 [ 1133.265427] __should_failslab+0x115/0x180 [ 1133.269672] should_failslab+0x5/0xf [ 1133.273392] __kmalloc+0x2ab/0x3c0 [ 1133.276950] ? ext4_mb_init+0x114/0x1790 [ 1133.281028] ext4_mb_init+0x114/0x1790 [ 1133.284925] ? ext4_setup_super+0x5f3/0x9f0 [ 1133.289265] ext4_fill_super+0x7308/0xc820 [ 1133.293535] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1133.298650] ? snprintf+0xbb/0xf0 [ 1133.302121] ? wait_for_completion_io+0x10/0x10 [ 1133.306801] ? set_blocksize+0x163/0x3f0 [ 1133.310881] mount_bdev+0x2fc/0x3b0 [ 1133.314512] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1133.319629] mount_fs+0xa3/0x30c [ 1133.323023] vfs_kern_mount.part.0+0x68/0x470 [ 1133.327535] do_mount+0x113c/0x2f10 [ 1133.331178] ? do_raw_spin_unlock+0x171/0x230 [ 1133.335679] ? check_preemption_disabled+0x41/0x280 [ 1133.340715] ? copy_mount_string+0x40/0x40 [ 1133.344959] ? copy_mount_options+0x59/0x380 [ 1133.349378] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1133.354403] ? kmem_cache_alloc_trace+0x323/0x380 [ 1133.359258] ? copy_mount_options+0x26f/0x380 [ 1133.363769] ksys_mount+0xcf/0x130 [ 1133.367325] __x64_sys_mount+0xba/0x150 [ 1133.371312] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1133.375906] do_syscall_64+0xf9/0x620 [ 1133.379726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.384917] RIP: 0033:0x46090a [ 1133.388112] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1133.407043] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1133.414741] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1133.422015] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1133.429271] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1133.436524] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1133.443785] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 21:07:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1133.456960] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1133.464473] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 1133.476036] EXT4-fs (loop5): mount failed 21:07:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffff000, 0x0) 21:07:10 executing program 5 (fault-call:3 fault-nth:93): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1133.642311] FAULT_INJECTION: forcing a failure. [ 1133.642311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1133.654160] CPU: 1 PID: 9047 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1133.661972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.671331] Call Trace: [ 1133.673936] dump_stack+0x1fc/0x2fe [ 1133.677580] should_fail.cold+0xa/0x14 [ 1133.681484] ? setup_fault_attr+0x200/0x200 [ 1133.685815] ? is_bpf_text_address+0xfc/0x1b0 [ 1133.690326] ? kernel_text_address+0xbd/0xf0 [ 1133.694749] __alloc_pages_nodemask+0x239/0x2890 [ 1133.699516] ? kasan_kmalloc+0x139/0x160 [ 1133.703582] ? __kmalloc_node+0x4c/0x70 [ 1133.707580] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1133.712436] ? __lock_acquire+0x6de/0x3ff0 [ 1133.716691] ? pcpu_alloc+0xe78/0x1190 [ 1133.720591] ? mark_held_locks+0xf0/0xf0 [ 1133.724661] ? lock_downgrade+0x720/0x720 [ 1133.728823] ? should_fail+0x142/0x7b0 [ 1133.732710] ? fs_reclaim_release+0xd0/0x110 [ 1133.737188] cache_grow_begin+0xa4/0x8a0 [ 1133.741246] ? setup_fault_attr+0x200/0x200 [ 1133.745560] cache_alloc_refill+0x273/0x340 [ 1133.749885] kmem_cache_alloc+0x346/0x370 [ 1133.754031] ? ext4_sync_fs+0x8d0/0x8d0 [ 1133.758034] ext4_alloc_inode+0x1a/0x630 [ 1133.762082] ? ext4_sync_fs+0x8d0/0x8d0 [ 1133.766164] alloc_inode+0x5d/0x180 [ 1133.769791] new_inode+0x1d/0xf0 [ 1133.773145] ext4_mb_init+0xa89/0x1790 [ 1133.777045] ext4_fill_super+0x7308/0xc820 [ 1133.781343] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1133.786447] ? snprintf+0xbb/0xf0 [ 1133.789893] ? wait_for_completion_io+0x10/0x10 [ 1133.794554] ? set_blocksize+0x163/0x3f0 [ 1133.798608] mount_bdev+0x2fc/0x3b0 [ 1133.802238] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1133.807344] mount_fs+0xa3/0x30c [ 1133.810717] vfs_kern_mount.part.0+0x68/0x470 [ 1133.815216] do_mount+0x113c/0x2f10 [ 1133.818861] ? lock_acquire+0x170/0x3c0 [ 1133.822827] ? check_preemption_disabled+0x41/0x280 [ 1133.827830] ? copy_mount_string+0x40/0x40 [ 1133.832054] ? copy_mount_options+0x59/0x380 [ 1133.836454] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1133.841560] ? kmem_cache_alloc_trace+0x323/0x380 [ 1133.846438] ? copy_mount_options+0x26f/0x380 [ 1133.850929] ksys_mount+0xcf/0x130 [ 1133.854465] __x64_sys_mount+0xba/0x150 [ 1133.858437] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1133.863024] do_syscall_64+0xf9/0x620 [ 1133.866823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.872005] RIP: 0033:0x46090a [ 1133.875185] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1133.894074] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1133.901781] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1133.909228] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1133.916490] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1133.923813] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1133.931076] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1133.949083] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:07:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078ce", 0x33}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:12 executing program 5 (fault-call:3 fault-nth:94): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1135.359342] FAULT_INJECTION: forcing a failure. [ 1135.359342] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.381654] CPU: 0 PID: 9063 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1135.389499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.398855] Call Trace: [ 1135.401447] dump_stack+0x1fc/0x2fe [ 1135.405090] should_fail.cold+0xa/0x14 [ 1135.408985] ? setup_fault_attr+0x200/0x200 [ 1135.413298] ? lock_acquire+0x170/0x3c0 [ 1135.417266] __should_failslab+0x115/0x180 [ 1135.421489] should_failslab+0x5/0xf [ 1135.425204] __kmalloc_track_caller+0x2a6/0x3c0 [ 1135.429866] ? kstrdup_const+0x53/0x80 [ 1135.433743] kstrdup+0x36/0x70 [ 1135.436920] kstrdup_const+0x53/0x80 [ 1135.440629] kvasprintf_const+0x108/0x190 [ 1135.444767] kobject_set_name_vargs+0x56/0x150 [ 1135.449352] kobject_init_and_add+0xc9/0x160 [ 1135.453749] ? kobject_create_and_add+0xb0/0xb0 [ 1135.458406] ? wait_for_completion_io+0x10/0x10 [ 1135.463064] ? __lockdep_init_map+0x100/0x5a0 [ 1135.467546] ? __lockdep_init_map+0x100/0x5a0 [ 1135.472030] ext4_register_sysfs+0xb5/0x270 [ 1135.476338] ext4_fill_super+0x7bcb/0xc820 [ 1135.480575] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1135.485666] ? snprintf+0xbb/0xf0 [ 1135.489109] ? wait_for_completion_io+0x10/0x10 [ 1135.493774] ? set_blocksize+0x163/0x3f0 [ 1135.497828] mount_bdev+0x2fc/0x3b0 [ 1135.501441] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1135.506530] mount_fs+0xa3/0x30c [ 1135.509886] vfs_kern_mount.part.0+0x68/0x470 [ 1135.514369] do_mount+0x113c/0x2f10 [ 1135.517983] ? lock_acquire+0x170/0x3c0 [ 1135.521943] ? check_preemption_disabled+0x41/0x280 [ 1135.526962] ? copy_mount_string+0x40/0x40 [ 1135.531199] ? copy_mount_options+0x59/0x380 [ 1135.535596] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1135.540624] ? kmem_cache_alloc_trace+0x323/0x380 [ 1135.545454] ? copy_mount_options+0x26f/0x380 [ 1135.549938] ksys_mount+0xcf/0x130 [ 1135.553465] __x64_sys_mount+0xba/0x150 [ 1135.557429] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1135.562082] do_syscall_64+0xf9/0x620 [ 1135.565886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.571059] RIP: 0033:0x46090a [ 1135.574236] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1135.593119] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1135.600814] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1135.608087] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1135.615358] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1135.622612] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1135.629870] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1135.645459] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:07:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1135.666506] kobject: can not set name properly! [ 1135.671630] EXT4-fs (loop5): mount failed 21:07:13 executing program 5 (fault-call:3 fault-nth:95): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1135.785612] FAULT_INJECTION: forcing a failure. [ 1135.785612] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.805082] CPU: 0 PID: 9083 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1135.812912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.822274] Call Trace: [ 1135.824873] dump_stack+0x1fc/0x2fe [ 1135.828512] should_fail.cold+0xa/0x14 [ 1135.832410] ? setup_fault_attr+0x200/0x200 [ 1135.836741] ? lock_acquire+0x170/0x3c0 [ 1135.840735] __should_failslab+0x115/0x180 [ 1135.844978] should_failslab+0x5/0xf [ 1135.848701] __kmalloc_track_caller+0x2a6/0x3c0 [ 1135.853380] ? kstrdup_const+0x53/0x80 [ 1135.857275] kstrdup+0x36/0x70 [ 1135.860478] kstrdup_const+0x53/0x80 [ 1135.864183] kvasprintf_const+0x108/0x190 [ 1135.868320] kobject_set_name_vargs+0x56/0x150 [ 1135.872895] kobject_init_and_add+0xc9/0x160 [ 1135.877291] ? kobject_create_and_add+0xb0/0xb0 [ 1135.881952] ? wait_for_completion_io+0x10/0x10 [ 1135.886607] ? __lockdep_init_map+0x100/0x5a0 [ 1135.891086] ? __lockdep_init_map+0x100/0x5a0 [ 1135.895574] ext4_register_sysfs+0xb5/0x270 [ 1135.899883] ext4_fill_super+0x7bcb/0xc820 [ 1135.904151] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1135.909250] ? snprintf+0xbb/0xf0 [ 1135.912693] ? wait_for_completion_io+0x10/0x10 [ 1135.917348] ? set_blocksize+0x163/0x3f0 [ 1135.921397] mount_bdev+0x2fc/0x3b0 [ 1135.925018] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1135.930123] mount_fs+0xa3/0x30c [ 1135.933481] vfs_kern_mount.part.0+0x68/0x470 [ 1135.937969] do_mount+0x113c/0x2f10 [ 1135.941586] ? lock_acquire+0x170/0x3c0 [ 1135.945547] ? check_preemption_disabled+0x41/0x280 [ 1135.950569] ? copy_mount_string+0x40/0x40 [ 1135.954789] ? copy_mount_options+0x59/0x380 [ 1135.959184] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1135.964188] ? kmem_cache_alloc_trace+0x323/0x380 [ 1135.969018] ? copy_mount_options+0x26f/0x380 [ 1135.973501] ksys_mount+0xcf/0x130 [ 1135.977029] __x64_sys_mount+0xba/0x150 [ 1135.981017] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1135.985600] do_syscall_64+0xf9/0x620 [ 1135.989389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.994563] RIP: 0033:0x46090a [ 1135.997743] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1136.016627] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1136.024323] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1136.031579] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1136.038832] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1136.046108] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1136.053366] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1136.067759] kobject: can not set name properly! [ 1136.072781] EXT4-fs (loop5): mount failed 21:07:13 executing program 5 (fault-call:3 fault-nth:96): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1136.077814] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:07:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) [ 1136.163844] FAULT_INJECTION: forcing a failure. [ 1136.163844] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.179804] CPU: 1 PID: 9100 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1136.187627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.196985] Call Trace: [ 1136.199584] dump_stack+0x1fc/0x2fe [ 1136.203251] should_fail.cold+0xa/0x14 [ 1136.207150] ? setup_fault_attr+0x200/0x200 [ 1136.211476] ? lock_acquire+0x170/0x3c0 [ 1136.215462] __should_failslab+0x115/0x180 [ 1136.219705] should_failslab+0x5/0xf [ 1136.223425] kmem_cache_alloc+0x277/0x370 [ 1136.227586] __kernfs_new_node+0xd2/0x680 [ 1136.231746] ? __mutex_lock+0x3a8/0x1260 [ 1136.235817] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1136.240587] ? kernfs_activate+0x2c/0x1d0 [ 1136.244747] ? lock_downgrade+0x720/0x720 [ 1136.248906] ? kernfs_add_one+0x51/0x4c0 [ 1136.252991] ? __mutex_add_waiter+0x160/0x160 [ 1136.257506] ? __mutex_unlock_slowpath+0xea/0x610 [ 1136.262367] kernfs_new_node+0x92/0x120 [ 1136.266438] __kernfs_create_file+0x51/0x33f [ 1136.270857] sysfs_add_file_mode_ns+0x226/0x540 [ 1136.275543] sysfs_create_file_ns+0x131/0x1b0 [ 1136.280047] ? sysfs_add_file_mode_ns+0x540/0x540 [ 1136.284898] ? sysfs_create_mount_point+0xb0/0xb0 [ 1136.289751] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1136.294788] kobject_add_internal+0x4f0/0x9c0 [ 1136.299277] kobject_init_and_add+0x101/0x160 [ 1136.303763] ? kobject_create_and_add+0xb0/0xb0 [ 1136.308426] ? wait_for_completion_io+0x10/0x10 [ 1136.313092] ? __lockdep_init_map+0x100/0x5a0 [ 1136.317574] ? __lockdep_init_map+0x100/0x5a0 [ 1136.322058] ext4_register_sysfs+0xb5/0x270 [ 1136.326382] ext4_fill_super+0x7bcb/0xc820 [ 1136.330626] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1136.335730] ? snprintf+0xbb/0xf0 [ 1136.339185] ? wait_for_completion_io+0x10/0x10 [ 1136.343838] ? set_blocksize+0x163/0x3f0 [ 1136.347894] mount_bdev+0x2fc/0x3b0 [ 1136.351508] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1136.356608] mount_fs+0xa3/0x30c [ 1136.359966] vfs_kern_mount.part.0+0x68/0x470 [ 1136.364449] do_mount+0x113c/0x2f10 [ 1136.368065] ? do_raw_spin_unlock+0x171/0x230 [ 1136.372543] ? check_preemption_disabled+0x41/0x280 [ 1136.377547] ? copy_mount_string+0x40/0x40 [ 1136.381778] ? copy_mount_options+0x59/0x380 [ 1136.386182] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1136.391205] ? kmem_cache_alloc_trace+0x323/0x380 [ 1136.396035] ? copy_mount_options+0x26f/0x380 [ 1136.400518] ksys_mount+0xcf/0x130 [ 1136.404043] __x64_sys_mount+0xba/0x150 [ 1136.408003] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1136.412567] do_syscall_64+0xf9/0x620 [ 1136.416353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.421527] RIP: 0033:0x46090a [ 1136.424703] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1136.443596] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1136.451291] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1136.458546] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1136.465798] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1136.473053] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1136.480306] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1136.496861] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 21:07:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@restrict, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x55}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1136.509104] kobject_add_internal failed for loop5 (error: -12 parent: ext4) [ 1136.517159] EXT4-fs (loop5): mount failed 21:07:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791c", 0x3a}], 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000080)) 21:07:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bcec4c2e238b5eae7192eabe2e3de30b647ed060d45b078cefd6321452d791cc0", 0x3b}], 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffffff6, 0x0) 21:07:14 executing program 5 (fault-call:3 fault-nth:97): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1136.675013] FAULT_INJECTION: forcing a failure. [ 1136.675013] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.681973] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1136.696522] CPU: 0 PID: 9129 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1136.704335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.713693] Call Trace: [ 1136.716282] dump_stack+0x1fc/0x2fe [ 1136.719909] should_fail.cold+0xa/0x14 [ 1136.723791] ? setup_fault_attr+0x200/0x200 [ 1136.728095] ? lock_acquire+0x170/0x3c0 [ 1136.732076] __should_failslab+0x115/0x180 [ 1136.736410] should_failslab+0x5/0xf [ 1136.740123] __kmalloc_track_caller+0x2a6/0x3c0 [ 1136.744820] ? kstrdup_const+0x53/0x80 [ 1136.748690] ? kstrdup+0x36/0x70 [ 1136.752068] kstrdup+0x36/0x70 [ 1136.755258] kstrdup_const+0x53/0x80 [ 1136.758963] __kernfs_new_node+0x9b/0x680 [ 1136.763105] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1136.767854] ? mark_held_locks+0xf0/0xf0 [ 1136.771917] ? kasan_kmalloc+0x139/0x160 [ 1136.775975] ? should_fail+0x142/0x7b0 [ 1136.779848] ? fs_reclaim_release+0xd0/0x110 [ 1136.784285] kernfs_create_dir_ns+0x9e/0x230 [ 1136.788676] sysfs_create_dir_ns+0x127/0x280 [ 1136.793082] ? sysfs_create_mount_point+0xb0/0xb0 [ 1136.797955] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1136.802977] ? check_preemption_disabled+0x41/0x280 [ 1136.807997] kobject_add_internal+0x2a5/0x9c0 [ 1136.812495] kobject_init_and_add+0x101/0x160 [ 1136.816982] ? kobject_create_and_add+0xb0/0xb0 [ 1136.821640] ? wait_for_completion_io+0x10/0x10 [ 1136.826303] ? __lockdep_init_map+0x100/0x5a0 [ 1136.830802] ? __lockdep_init_map+0x100/0x5a0 [ 1136.835296] ext4_register_sysfs+0xb5/0x270 [ 1136.839616] ext4_fill_super+0x7bcb/0xc820 [ 1136.843854] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1136.848941] ? snprintf+0xbb/0xf0 [ 1136.852396] ? wait_for_completion_io+0x10/0x10 [ 1136.857057] ? set_blocksize+0x163/0x3f0 [ 1136.861121] mount_bdev+0x2fc/0x3b0 [ 1136.864743] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1136.869842] mount_fs+0xa3/0x30c [ 1136.873213] vfs_kern_mount.part.0+0x68/0x470 [ 1136.877705] do_mount+0x113c/0x2f10 [ 1136.881321] ? lock_acquire+0x170/0x3c0 [ 1136.885282] ? check_preemption_disabled+0x41/0x280 [ 1136.890284] ? copy_mount_string+0x40/0x40 [ 1136.894693] ? copy_mount_options+0x59/0x380 [ 1136.899101] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1136.904126] ? kmem_cache_alloc_trace+0x323/0x380 [ 1136.908955] ? copy_mount_options+0x26f/0x380 [ 1136.913453] ksys_mount+0xcf/0x130 [ 1136.916991] __x64_sys_mount+0xba/0x150 [ 1136.920964] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1136.925540] do_syscall_64+0xf9/0x620 [ 1136.929336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.934527] RIP: 0033:0x46090a [ 1136.937712] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1136.956619] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1136.964312] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a 21:07:14 executing program 5 (fault-call:3 fault-nth:98): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000080)) [ 1136.971576] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1136.978840] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1136.986109] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1136.993373] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1137.006325] kobject_add_internal failed for loop5 (error: -12 parent: ext4) [ 1137.014802] EXT4-fs (loop5): mount failed [ 1137.107298] FAULT_INJECTION: forcing a failure. [ 1137.107298] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.124945] CPU: 1 PID: 9146 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1137.132776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.142134] Call Trace: [ 1137.144738] dump_stack+0x1fc/0x2fe [ 1137.148380] should_fail.cold+0xa/0x14 [ 1137.152282] ? setup_fault_attr+0x200/0x200 [ 1137.156603] ? lock_acquire+0x170/0x3c0 [ 1137.160568] __should_failslab+0x115/0x180 [ 1137.164892] should_failslab+0x5/0xf [ 1137.168594] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1137.173693] __kmalloc_node+0x38/0x70 [ 1137.177574] kvmalloc_node+0x61/0xf0 [ 1137.181274] ext4_alloc_flex_bg_array+0x1b8/0x620 [ 1137.186120] ext4_fill_super+0xbddf/0xc820 [ 1137.190372] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1137.195463] ? snprintf+0xbb/0xf0 [ 1137.198902] ? wait_for_completion_io+0x10/0x10 [ 1137.204436] ? set_blocksize+0x163/0x3f0 [ 1137.208484] mount_bdev+0x2fc/0x3b0 [ 1137.212118] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 1137.217226] mount_fs+0xa3/0x30c [ 1137.220577] vfs_kern_mount.part.0+0x68/0x470 [ 1137.225058] do_mount+0x113c/0x2f10 [ 1137.228682] ? rcu_nmi_exit+0xb3/0x180 [ 1137.232557] ? copy_mount_string+0x40/0x40 [ 1137.236778] ? copy_mount_options+0x1da/0x380 [ 1137.241257] ? copy_mount_options+0x1e0/0x380 [ 1137.245748] ? copy_mount_options+0x26f/0x380 [ 1137.250251] ksys_mount+0xcf/0x130 [ 1137.253782] __x64_sys_mount+0xba/0x150 [ 1137.257743] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1137.262426] do_syscall_64+0xf9/0x620 [ 1137.266222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.271485] RIP: 0033:0x46090a [ 1137.274661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1137.293540] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1137.301228] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1137.308480] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1137.315731] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1137.322982] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1137.330243] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1137.350870] EXT4-fs (loop5): not enough memory for 1 flex groups [ 1137.357911] EXT4-fs (loop5): unable to initialize flex_bg meta info! [ 1137.365290] EXT4-fs (loop5): mount failed [ 1137.369782] kasan: CONFIG_KASAN_INLINE enabled [ 1137.375713] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1137.383631] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1137.389879] CPU: 1 PID: 9146 Comm: syz-executor.5 Not tainted 4.19.159-syzkaller #0 [ 1137.397663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.407023] RIP: 0010:mount_fs+0xe0/0x30c [ 1137.411154] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 09 93 be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 1137.430060] RSP: 0018:ffff88809cac7ce0 EFLAGS: 00010202 [ 1137.435412] RAX: dffffc0000000000 RBX: ffffffff8a0a8800 RCX: ffffc9001057a000 [ 1137.442674] RDX: 0000000000000019 RSI: ffffffff81a63cf7 RDI: 00000000000000c8 [ 1137.449989] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 1137.457293] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1137.464546] R13: ffff88808f55e840 R14: 0000000000000000 R15: ffff88809ba14000 [ 1137.471805] FS: 00007fe4fe96b700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1137.480020] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1137.485892] CR2: 00007f8047e7d000 CR3: 0000000050c2d000 CR4: 00000000001406e0 [ 1137.493231] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1137.500490] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1137.507743] Call Trace: [ 1137.510325] vfs_kern_mount.part.0+0x68/0x470 [ 1137.514806] do_mount+0x113c/0x2f10 [ 1137.518431] ? rcu_nmi_exit+0xb3/0x180 [ 1137.522328] ? copy_mount_string+0x40/0x40 [ 1137.526548] ? copy_mount_options+0x1da/0x380 [ 1137.531025] ? copy_mount_options+0x1e0/0x380 [ 1137.535501] ? copy_mount_options+0x26f/0x380 [ 1137.539991] ksys_mount+0xcf/0x130 [ 1137.543520] __x64_sys_mount+0xba/0x150 [ 1137.547477] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1137.552036] do_syscall_64+0xf9/0x620 [ 1137.555833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.561024] RIP: 0033:0x46090a [ 1137.564199] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1137.583084] RSP: 002b:00007fe4fe96aa88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1137.590776] RAX: ffffffffffffffda RBX: 00007fe4fe96ab20 RCX: 000000000046090a [ 1137.598081] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fe4fe96aae0 [ 1137.605340] RBP: 00007fe4fe96aae0 R08: 00007fe4fe96ab20 R09: 0000000020000000 [ 1137.612680] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1137.620064] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 1137.627356] Modules linked in: [ 1137.634260] ---[ end trace c113467092b73c56 ]--- [ 1137.639083] RIP: 0010:mount_fs+0xe0/0x30c [ 1137.643453] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 09 93 be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 1137.662556] RSP: 0018:ffff88809cac7ce0 EFLAGS: 00010202 [ 1137.667927] RAX: dffffc0000000000 RBX: ffffffff8a0a8800 RCX: ffffc9001057a000 [ 1137.675239] RDX: 0000000000000019 RSI: ffffffff81a63cf7 RDI: 00000000000000c8 [ 1137.683102] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 1137.690427] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1137.697711] R13: ffff88808f55e840 R14: 0000000000000000 R15: ffff88809ba14000 [ 1137.705036] FS: 00007fe4fe96b700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1137.713318] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1137.719193] CR2: 00007f8047e7d000 CR3: 0000000050c2d000 CR4: 00000000001406e0 [ 1137.726492] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1137.733814] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1137.741212] Kernel panic - not syncing: Fatal exception [ 1137.747225] Kernel Offset: disabled [ 1137.750848] Rebooting in 86400 seconds..