09:49:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001080)="47901d78baba154cc30830274b3709b84583110c6c6240596be60b4193004f0dee92710c3d88efad74b6353e2566fa6dfc36bd92999bbf63aff96a6a17f0cfa16f5c080e78fb3686390f970757e8095de2a3b314b0355eda4cfb6fd8ef8b", 0x5e}], 0x1}}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{}]}) 09:49:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffff600000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1263.850686] ISOFS: unable to read i-node block [ 1263.856557] isofs_fill_super: get root inode failed 09:50:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xbd00, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039600200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x62030000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000fffffdfd00000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1264.349873] ISOFS: unable to read i-node block 09:50:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), 0x0, 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1264.378611] isofs_fill_super: get root inode failed 09:50:00 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:00 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001080)="47901d78baba154cc30830274b3709b84583110c6c6240596be60b4193004f0dee92710c3d88efad74b6353e2566fa6dfc36bd92999bbf63aff96a6a17f0cfa16f5c080e78fb3686390f970757e8095de2a3b314b0355eda4cfb6fd8ef8b", 0x5e}], 0x1}}], 0x1, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r3, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r5 = dup(0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x20, 0x6, @local}, 0x14) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="833695d1b54daaaaaaaaaabb08004500001c000000000002907800000000e00000011200907800150000"], 0x0) fanotify_mark(r5, 0x18, 0x1022, r2, &(0x7f0000000180)='./file0\x00') 09:50:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xbe00, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039700200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:00 executing program 3 (fault-call:9 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1265.032247] ptrace attach of "/root/syz-executor.1"[29557] was attempted by "/root/syz-executor.1"[29561] [ 1265.064127] ISOFS: unable to read i-node block [ 1265.073744] FAULT_INJECTION: forcing a failure. 09:50:00 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1265.073744] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.091897] isofs_fill_super: get root inode failed 09:50:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1265.125024] CPU: 1 PID: 29554 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1265.132972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1265.142325] Call Trace: [ 1265.144918] dump_stack+0x1fc/0x2ef [ 1265.148567] should_fail.cold+0xa/0xf [ 1265.152401] ? setup_fault_attr+0x200/0x200 [ 1265.156729] ? lock_acquire+0x170/0x3c0 [ 1265.160713] __should_failslab+0x115/0x180 [ 1265.164959] should_failslab+0x5/0x10 [ 1265.168779] kmem_cache_alloc+0x277/0x370 [ 1265.172944] mmu_topup_memory_caches+0x8f/0x370 [ 1265.177627] kvm_mmu_load+0x1e/0x1200 [ 1265.181431] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1265.186362] ? construct_eptp+0x3b0/0x3b0 [ 1265.190509] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1265.195365] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1265.200320] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1265.205165] ? get_task_pid+0x143/0x2a0 [ 1265.209147] ? lock_downgrade+0x720/0x720 [ 1265.213296] ? check_preemption_disabled+0x41/0x280 [ 1265.218324] ? check_preemption_disabled+0x41/0x280 [ 1265.223346] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1265.227491] kvm_vcpu_ioctl+0x493/0xe10 [ 1265.231478] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1265.237457] ? get_pid_task+0xf4/0x190 [ 1265.241350] ? mark_held_locks+0xf0/0xf0 [ 1265.245409] ? proc_fail_nth_write+0x95/0x1d0 [ 1265.249906] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1265.254842] ? ksys_write+0x241/0x2a0 [ 1265.258645] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1265.264531] do_vfs_ioctl+0xcdb/0x12e0 [ 1265.268425] ? lock_downgrade+0x720/0x720 [ 1265.272662] ? check_preemption_disabled+0x41/0x280 [ 1265.277681] ? ioctl_preallocate+0x200/0x200 [ 1265.282092] ? __fget+0x356/0x510 [ 1265.285553] ? do_dup2+0x450/0x450 [ 1265.289097] ? vfs_write+0x393/0x540 [ 1265.292809] ? fput+0x2b/0x190 [ 1265.296010] ksys_ioctl+0x9b/0xc0 [ 1265.299468] __x64_sys_ioctl+0x6f/0xb0 [ 1265.303422] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1265.308003] do_syscall_64+0xf9/0x620 [ 1265.311806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1265.316991] RIP: 0033:0x4665f9 [ 1265.320191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1265.339176] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1265.346884] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1265.354149] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1265.361496] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1265.368765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1265.376026] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:01 executing program 3 (fault-call:9 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039800200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1265.557936] FAULT_INJECTION: forcing a failure. [ 1265.557936] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.580341] CPU: 1 PID: 29593 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1265.588288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1265.597662] Call Trace: [ 1265.600391] dump_stack+0x1fc/0x2ef [ 1265.604025] should_fail.cold+0xa/0xf [ 1265.607829] ? setup_fault_attr+0x200/0x200 [ 1265.612150] ? lock_acquire+0x170/0x3c0 [ 1265.616221] __should_failslab+0x115/0x180 [ 1265.620460] should_failslab+0x5/0x10 [ 1265.624262] kmem_cache_alloc+0x277/0x370 [ 1265.628416] mmu_topup_memory_caches+0x8f/0x370 [ 1265.633095] kvm_mmu_load+0x1e/0x1200 [ 1265.636899] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1265.641833] ? construct_eptp+0x3b0/0x3b0 [ 1265.645976] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1265.650850] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1265.655803] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1265.660661] ? get_task_pid+0x143/0x2a0 [ 1265.664650] ? lock_downgrade+0x720/0x720 [ 1265.668800] ? check_preemption_disabled+0x41/0x280 [ 1265.673818] ? check_preemption_disabled+0x41/0x280 [ 1265.678844] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1265.682992] kvm_vcpu_ioctl+0x493/0xe10 [ 1265.686973] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1265.692863] ? get_pid_task+0xf4/0x190 [ 1265.696750] ? mark_held_locks+0xf0/0xf0 [ 1265.700813] ? proc_fail_nth_write+0x95/0x1d0 [ 1265.705307] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1265.710250] ? ksys_write+0x241/0x2a0 [ 1265.714054] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1265.719940] do_vfs_ioctl+0xcdb/0x12e0 [ 1265.723830] ? lock_downgrade+0x720/0x720 [ 1265.727981] ? check_preemption_disabled+0x41/0x280 [ 1265.732996] ? ioctl_preallocate+0x200/0x200 [ 1265.737410] ? __fget+0x356/0x510 [ 1265.740863] ? do_dup2+0x450/0x450 [ 1265.744401] ? vfs_write+0x393/0x540 [ 1265.748113] ? fput+0x2b/0x190 [ 1265.751313] ksys_ioctl+0x9b/0xc0 [ 1265.754771] __x64_sys_ioctl+0x6f/0xb0 [ 1265.758663] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1265.763247] do_syscall_64+0xf9/0x620 [ 1265.767056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1265.772242] RIP: 0033:0x4665f9 [ 1265.775434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1265.794802] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1265.802513] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1265.809775] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1265.817027] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1265.824287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1265.831535] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f8c, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:01 executing program 3 (fault-call:9 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039900200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000feffffff00000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1266.101641] FAULT_INJECTION: forcing a failure. [ 1266.101641] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.138234] ISOFS: unable to read i-node block [ 1266.143036] CPU: 0 PID: 29624 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1266.150929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.160285] Call Trace: [ 1266.162886] dump_stack+0x1fc/0x2ef [ 1266.166563] should_fail.cold+0xa/0xf [ 1266.170372] ? setup_fault_attr+0x200/0x200 [ 1266.174694] ? lock_acquire+0x170/0x3c0 [ 1266.178726] __should_failslab+0x115/0x180 [ 1266.182977] should_failslab+0x5/0x10 [ 1266.186784] kmem_cache_alloc+0x277/0x370 [ 1266.190947] mmu_topup_memory_caches+0x8f/0x370 [ 1266.195631] kvm_mmu_load+0x1e/0x1200 [ 1266.199433] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1266.204359] ? construct_eptp+0x3b0/0x3b0 [ 1266.208517] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1266.213371] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1266.218327] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1266.223171] ? get_task_pid+0x143/0x2a0 [ 1266.227153] ? lock_downgrade+0x720/0x720 [ 1266.231306] ? check_preemption_disabled+0x41/0x280 [ 1266.236340] ? check_preemption_disabled+0x41/0x280 [ 1266.241390] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1266.245545] kvm_vcpu_ioctl+0x493/0xe10 [ 1266.249530] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1266.255424] ? get_pid_task+0xf4/0x190 [ 1266.259318] ? mark_held_locks+0xf0/0xf0 [ 1266.263383] ? proc_fail_nth_write+0x95/0x1d0 [ 1266.267883] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1266.272832] ? ksys_write+0x241/0x2a0 [ 1266.276651] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1266.282545] do_vfs_ioctl+0xcdb/0x12e0 [ 1266.286445] ? lock_downgrade+0x720/0x720 [ 1266.290633] ? check_preemption_disabled+0x41/0x280 [ 1266.295668] ? ioctl_preallocate+0x200/0x200 [ 1266.300094] ? __fget+0x356/0x510 [ 1266.303564] ? do_dup2+0x450/0x450 [ 1266.307112] ? vfs_write+0x393/0x540 [ 1266.310832] ? fput+0x2b/0x190 [ 1266.314154] ksys_ioctl+0x9b/0xc0 [ 1266.317617] __x64_sys_ioctl+0x6f/0xb0 [ 1266.321511] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1266.326131] do_syscall_64+0xf9/0x620 [ 1266.329954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1266.335237] RIP: 0033:0x4665f9 [ 1266.338113] isofs_fill_super: get root inode failed [ 1266.338452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1266.362445] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1266.370173] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1266.377455] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1266.384956] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1266.392238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:50:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000037dc12502000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1266.399520] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039a00200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000100000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1266.632560] ISOFS: unable to read i-node block [ 1266.651468] isofs_fill_super: get root inode failed 09:50:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f8d, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:02 executing program 3 (fault-call:9 fault-nth:3): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000002000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039b00200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1267.035640] ISOFS: unable to read i-node block [ 1267.044011] isofs_fill_super: get root inode failed [ 1267.074607] FAULT_INJECTION: forcing a failure. [ 1267.074607] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.088290] CPU: 0 PID: 29691 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1267.096219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.105584] Call Trace: [ 1267.108228] dump_stack+0x1fc/0x2ef [ 1267.111883] should_fail.cold+0xa/0xf [ 1267.115702] ? setup_fault_attr+0x200/0x200 [ 1267.120028] ? lock_acquire+0x170/0x3c0 [ 1267.124099] __should_failslab+0x115/0x180 [ 1267.128600] should_failslab+0x5/0x10 [ 1267.132408] kmem_cache_alloc+0x277/0x370 [ 1267.136562] mmu_topup_memory_caches+0x8f/0x370 [ 1267.141238] kvm_mmu_load+0x1e/0x1200 [ 1267.145039] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1267.149970] ? construct_eptp+0x3b0/0x3b0 [ 1267.154270] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1267.159489] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1267.164647] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1267.169502] ? get_task_pid+0x143/0x2a0 [ 1267.173524] ? lock_downgrade+0x720/0x720 [ 1267.177856] ? check_preemption_disabled+0x41/0x280 [ 1267.182878] ? check_preemption_disabled+0x41/0x280 [ 1267.187909] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1267.192070] kvm_vcpu_ioctl+0x493/0xe10 [ 1267.196257] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1267.202587] ? get_pid_task+0xf4/0x190 [ 1267.206483] ? mark_held_locks+0xf0/0xf0 [ 1267.211153] ? proc_fail_nth_write+0x95/0x1d0 [ 1267.215827] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1267.220987] ? ksys_write+0x241/0x2a0 [ 1267.224792] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1267.230782] do_vfs_ioctl+0xcdb/0x12e0 [ 1267.234679] ? lock_downgrade+0x720/0x720 [ 1267.238836] ? check_preemption_disabled+0x41/0x280 [ 1267.243976] ? ioctl_preallocate+0x200/0x200 [ 1267.248403] ? __fget+0x356/0x510 [ 1267.251863] ? do_dup2+0x450/0x450 [ 1267.255404] ? vfs_write+0x393/0x540 [ 1267.259117] ? fput+0x2b/0x190 [ 1267.262321] ksys_ioctl+0x9b/0xc0 [ 1267.265865] __x64_sys_ioctl+0x6f/0xb0 [ 1267.269761] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1267.274349] do_syscall_64+0xf9/0x620 [ 1267.278161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1267.283358] RIP: 0033:0x4665f9 [ 1267.286556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.305462] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.313185] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1267.320607] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1267.327881] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 09:50:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1267.335155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1267.342426] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039c00200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:03 executing program 3 (fault-call:9 fault-nth:4): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1267.596293] ISOFS: unable to read i-node block [ 1267.614056] isofs_fill_super: get root inode failed [ 1267.618906] FAULT_INJECTION: forcing a failure. [ 1267.618906] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.651380] CPU: 0 PID: 29721 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1267.659345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.668707] Call Trace: [ 1267.671319] dump_stack+0x1fc/0x2ef [ 1267.674993] should_fail.cold+0xa/0xf [ 1267.678820] ? setup_fault_attr+0x200/0x200 [ 1267.683143] ? lock_acquire+0x170/0x3c0 [ 1267.687127] __should_failslab+0x115/0x180 [ 1267.691366] should_failslab+0x5/0x10 [ 1267.695170] kmem_cache_alloc+0x277/0x370 [ 1267.699325] mmu_topup_memory_caches+0x8f/0x370 [ 1267.704003] kvm_mmu_load+0x1e/0x1200 [ 1267.707808] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1267.712740] ? construct_eptp+0x3b0/0x3b0 [ 1267.716896] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1267.721756] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1267.726704] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1267.731639] ? get_task_pid+0x143/0x2a0 [ 1267.735629] ? lock_downgrade+0x720/0x720 [ 1267.739781] ? check_preemption_disabled+0x41/0x280 [ 1267.744802] ? check_preemption_disabled+0x41/0x280 [ 1267.749825] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1267.754001] kvm_vcpu_ioctl+0x493/0xe10 [ 1267.757999] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1267.763896] ? get_pid_task+0xf4/0x190 [ 1267.767799] ? mark_held_locks+0xf0/0xf0 [ 1267.771864] ? proc_fail_nth_write+0x95/0x1d0 [ 1267.776365] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1267.781310] ? ksys_write+0x241/0x2a0 [ 1267.785232] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1267.791126] do_vfs_ioctl+0xcdb/0x12e0 [ 1267.795024] ? lock_downgrade+0x720/0x720 [ 1267.799195] ? check_preemption_disabled+0x41/0x280 [ 1267.804220] ? ioctl_preallocate+0x200/0x200 [ 1267.808654] ? __fget+0x356/0x510 [ 1267.812201] ? do_dup2+0x450/0x450 [ 1267.815743] ? vfs_write+0x393/0x540 [ 1267.819459] ? fput+0x2b/0x190 [ 1267.822662] ksys_ioctl+0x9b/0xc0 [ 1267.826122] __x64_sys_ioctl+0x6f/0xb0 [ 1267.830035] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1267.834622] do_syscall_64+0xf9/0x620 [ 1267.838430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1267.843618] RIP: 0033:0x4665f9 [ 1267.846815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.865720] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1267.873435] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1267.880706] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1267.887978] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1267.895251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1267.902536] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f8e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:03 executing program 3 (fault-call:9 fault-nth:5): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020039d00200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1268.106090] ISOFS: unable to read i-node block [ 1268.139262] FAULT_INJECTION: forcing a failure. [ 1268.139262] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.150825] isofs_fill_super: get root inode failed [ 1268.175730] CPU: 0 PID: 29746 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1268.183669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.193205] Call Trace: [ 1268.195812] dump_stack+0x1fc/0x2ef [ 1268.199453] should_fail.cold+0xa/0xf [ 1268.203266] ? setup_fault_attr+0x200/0x200 [ 1268.207888] ? lock_acquire+0x170/0x3c0 [ 1268.211882] __should_failslab+0x115/0x180 [ 1268.216128] should_failslab+0x5/0x10 [ 1268.219932] kmem_cache_alloc+0x277/0x370 [ 1268.224173] mmu_topup_memory_caches+0x8f/0x370 [ 1268.228870] kvm_mmu_load+0x1e/0x1200 [ 1268.232688] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1268.237625] ? construct_eptp+0x3b0/0x3b0 [ 1268.241951] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1268.246817] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1268.251784] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1268.257104] ? get_task_pid+0x143/0x2a0 [ 1268.261182] ? lock_downgrade+0x720/0x720 [ 1268.265341] ? check_preemption_disabled+0x41/0x280 [ 1268.270370] ? check_preemption_disabled+0x41/0x280 [ 1268.275398] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1268.279550] kvm_vcpu_ioctl+0x493/0xe10 [ 1268.283798] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1268.289700] ? get_pid_task+0xf4/0x190 [ 1268.293599] ? mark_held_locks+0xf0/0xf0 [ 1268.297662] ? proc_fail_nth_write+0x95/0x1d0 [ 1268.302162] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1268.307106] ? ksys_write+0x241/0x2a0 [ 1268.310919] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1268.316834] do_vfs_ioctl+0xcdb/0x12e0 [ 1268.320731] ? lock_downgrade+0x720/0x720 [ 1268.324887] ? check_preemption_disabled+0x41/0x280 [ 1268.329911] ? ioctl_preallocate+0x200/0x200 [ 1268.334333] ? __fget+0x356/0x510 [ 1268.337794] ? do_dup2+0x450/0x450 [ 1268.341334] ? vfs_write+0x393/0x540 [ 1268.345094] ? fput+0x2b/0x190 [ 1268.348297] ksys_ioctl+0x9b/0xc0 [ 1268.351759] __x64_sys_ioctl+0x6f/0xb0 [ 1268.355653] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1268.360239] do_syscall_64+0xf9/0x620 [ 1268.364048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.369250] RIP: 0033:0x4665f9 [ 1268.372446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.391350] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1268.399075] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1268.406345] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1268.413621] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1268.420893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1268.428201] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:04 executing program 3 (fault-call:9 fault-nth:6): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020000400200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1268.680044] FAULT_INJECTION: forcing a failure. [ 1268.680044] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.697405] CPU: 0 PID: 29777 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1268.705313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.714672] Call Trace: [ 1268.717275] dump_stack+0x1fc/0x2ef [ 1268.720918] should_fail.cold+0xa/0xf [ 1268.724721] ? setup_fault_attr+0x200/0x200 [ 1268.729042] ? lock_acquire+0x170/0x3c0 [ 1268.733043] __should_failslab+0x115/0x180 [ 1268.737283] should_failslab+0x5/0x10 [ 1268.741093] kmem_cache_alloc+0x277/0x370 [ 1268.745245] mmu_topup_memory_caches+0x8f/0x370 [ 1268.749934] kvm_mmu_load+0x1e/0x1200 [ 1268.753737] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1268.758673] ? construct_eptp+0x3b0/0x3b0 [ 1268.762821] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1268.767707] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1268.772653] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1268.777497] ? get_task_pid+0x143/0x2a0 [ 1268.781480] ? lock_downgrade+0x720/0x720 [ 1268.785630] ? check_preemption_disabled+0x41/0x280 [ 1268.790650] ? check_preemption_disabled+0x41/0x280 [ 1268.795675] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1268.799823] kvm_vcpu_ioctl+0x493/0xe10 [ 1268.803803] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1268.809691] ? get_pid_task+0xf4/0x190 [ 1268.813700] ? mark_held_locks+0xf0/0xf0 [ 1268.817798] ? proc_fail_nth_write+0x95/0x1d0 [ 1268.822297] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1268.827242] ? ksys_write+0x241/0x2a0 [ 1268.831053] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1268.836943] do_vfs_ioctl+0xcdb/0x12e0 [ 1268.840839] ? lock_downgrade+0x720/0x720 [ 1268.844992] ? check_preemption_disabled+0x41/0x280 [ 1268.850010] ? ioctl_preallocate+0x200/0x200 [ 1268.854421] ? __fget+0x356/0x510 [ 1268.857875] ? do_dup2+0x450/0x450 [ 1268.861417] ? vfs_write+0x393/0x540 [ 1268.865132] ? fput+0x2b/0x190 [ 1268.868333] ksys_ioctl+0x9b/0xc0 [ 1268.872222] __x64_sys_ioctl+0x6f/0xb0 [ 1268.876112] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1268.880723] do_syscall_64+0xf9/0x620 [ 1268.884538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.889726] RIP: 0033:0x4665f9 [ 1268.892931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.913049] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1268.920760] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1268.928029] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1268.935310] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1268.942582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1268.949942] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f8f, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:05 executing program 3 (fault-call:9 fault-nth:7): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020000500200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1269.253793] FAULT_INJECTION: forcing a failure. [ 1269.253793] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.271710] CPU: 1 PID: 29816 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1269.279615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.288971] Call Trace: [ 1269.291568] dump_stack+0x1fc/0x2ef [ 1269.295290] should_fail.cold+0xa/0xf [ 1269.299105] ? setup_fault_attr+0x200/0x200 [ 1269.303436] ? lock_acquire+0x170/0x3c0 [ 1269.307511] __should_failslab+0x115/0x180 [ 1269.311773] should_failslab+0x5/0x10 [ 1269.315576] kmem_cache_alloc+0x277/0x370 [ 1269.319729] mmu_topup_memory_caches+0x8f/0x370 [ 1269.324404] kvm_mmu_load+0x1e/0x1200 [ 1269.328301] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1269.333334] ? construct_eptp+0x3b0/0x3b0 [ 1269.337483] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1269.342346] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1269.347299] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1269.352148] ? get_task_pid+0x143/0x2a0 [ 1269.356131] ? lock_downgrade+0x720/0x720 [ 1269.360284] ? check_preemption_disabled+0x41/0x280 [ 1269.365317] ? check_preemption_disabled+0x41/0x280 [ 1269.370353] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1269.374497] kvm_vcpu_ioctl+0x493/0xe10 [ 1269.378474] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1269.384363] ? get_pid_task+0xf4/0x190 [ 1269.388254] ? mark_held_locks+0xf0/0xf0 [ 1269.392318] ? proc_fail_nth_write+0x95/0x1d0 [ 1269.396814] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1269.401756] ? ksys_write+0x241/0x2a0 [ 1269.405562] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1269.411453] do_vfs_ioctl+0xcdb/0x12e0 [ 1269.415349] ? lock_downgrade+0x720/0x720 [ 1269.419502] ? check_preemption_disabled+0x41/0x280 [ 1269.424523] ? ioctl_preallocate+0x200/0x200 [ 1269.428959] ? __fget+0x356/0x510 [ 1269.432416] ? do_dup2+0x450/0x450 [ 1269.435956] ? vfs_write+0x393/0x540 [ 1269.439673] ? fput+0x2b/0x190 [ 1269.442876] ksys_ioctl+0x9b/0xc0 [ 1269.446336] __x64_sys_ioctl+0x6f/0xb0 [ 1269.450224] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1269.454807] do_syscall_64+0xf9/0x620 [ 1269.458616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1269.463804] RIP: 0033:0x4665f9 [ 1269.467080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.485982] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1269.493780] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1269.501048] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1269.508318] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.515586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1269.522854] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:05 executing program 3 (fault-call:9 fault-nth:8): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020000a00200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1269.832582] ISOFS: unable to read i-node block [ 1269.849033] isofs_fill_super: get root inode failed [ 1269.860049] FAULT_INJECTION: forcing a failure. [ 1269.860049] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.886295] CPU: 1 PID: 29846 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1269.894220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.903579] Call Trace: [ 1269.906183] dump_stack+0x1fc/0x2ef [ 1269.909825] should_fail.cold+0xa/0xf [ 1269.913636] ? setup_fault_attr+0x200/0x200 [ 1269.917962] ? lock_acquire+0x170/0x3c0 [ 1269.921945] __should_failslab+0x115/0x180 [ 1269.926185] should_failslab+0x5/0x10 [ 1269.929990] kmem_cache_alloc+0x277/0x370 [ 1269.934166] mmu_topup_memory_caches+0x8f/0x370 [ 1269.938837] kvm_mmu_load+0x1e/0x1200 [ 1269.942636] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1269.947831] ? construct_eptp+0x3b0/0x3b0 [ 1269.951988] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1269.956836] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1269.961783] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1269.966629] ? get_task_pid+0x143/0x2a0 [ 1269.970628] ? lock_downgrade+0x720/0x720 [ 1269.974788] ? check_preemption_disabled+0x41/0x280 [ 1269.979814] ? check_preemption_disabled+0x41/0x280 [ 1269.984853] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1269.989021] kvm_vcpu_ioctl+0x493/0xe10 [ 1269.993028] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1269.998924] ? get_pid_task+0xf4/0x190 [ 1270.002812] ? mark_held_locks+0xf0/0xf0 [ 1270.006885] ? proc_fail_nth_write+0x95/0x1d0 [ 1270.011382] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1270.016324] ? ksys_write+0x241/0x2a0 [ 1270.020130] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1270.026024] do_vfs_ioctl+0xcdb/0x12e0 [ 1270.029920] ? lock_downgrade+0x720/0x720 [ 1270.034072] ? check_preemption_disabled+0x41/0x280 [ 1270.039089] ? ioctl_preallocate+0x200/0x200 [ 1270.043513] ? __fget+0x356/0x510 [ 1270.046978] ? do_dup2+0x450/0x450 [ 1270.050526] ? vfs_write+0x393/0x540 [ 1270.054348] ? fput+0x2b/0x190 [ 1270.057574] ksys_ioctl+0x9b/0xc0 [ 1270.061126] __x64_sys_ioctl+0x6f/0xb0 [ 1270.065025] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1270.069612] do_syscall_64+0xf9/0x620 [ 1270.073429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1270.078615] RIP: 0033:0x4665f9 [ 1270.081808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.100731] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1270.108443] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1270.115717] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1270.122992] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.130265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1270.137538] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f90, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:08 executing program 3 (fault-call:9 fault-nth:9): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000", 0x4c, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002200200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f91, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1272.278342] FAULT_INJECTION: forcing a failure. [ 1272.278342] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.319161] ISOFS: unable to read i-node block [ 1272.327084] isofs_fill_super: get root inode failed [ 1272.350860] CPU: 0 PID: 29885 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1272.358940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.368297] Call Trace: [ 1272.370893] dump_stack+0x1fc/0x2ef [ 1272.374526] should_fail.cold+0xa/0xf [ 1272.378331] ? setup_fault_attr+0x200/0x200 [ 1272.382657] ? lock_acquire+0x170/0x3c0 [ 1272.386638] __should_failslab+0x115/0x180 [ 1272.390877] should_failslab+0x5/0x10 [ 1272.394764] kmem_cache_alloc+0x277/0x370 [ 1272.398914] mmu_topup_memory_caches+0x8f/0x370 [ 1272.403675] kvm_mmu_load+0x1e/0x1200 [ 1272.407477] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1272.412403] ? construct_eptp+0x3b0/0x3b0 [ 1272.416573] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1272.421427] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1272.426375] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1272.431216] ? get_task_pid+0x143/0x2a0 [ 1272.435200] ? lock_downgrade+0x720/0x720 [ 1272.439352] ? check_preemption_disabled+0x41/0x280 [ 1272.444382] ? check_preemption_disabled+0x41/0x280 [ 1272.449409] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1272.453553] kvm_vcpu_ioctl+0x493/0xe10 [ 1272.457590] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1272.463483] ? get_pid_task+0xf4/0x190 [ 1272.467634] ? mark_held_locks+0xf0/0xf0 [ 1272.471698] ? proc_fail_nth_write+0x95/0x1d0 [ 1272.476200] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1272.481169] ? ksys_write+0x241/0x2a0 [ 1272.484973] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1272.490857] do_vfs_ioctl+0xcdb/0x12e0 [ 1272.494746] ? lock_downgrade+0x720/0x720 [ 1272.498894] ? check_preemption_disabled+0x41/0x280 [ 1272.503914] ? ioctl_preallocate+0x200/0x200 [ 1272.508331] ? __fget+0x356/0x510 [ 1272.511788] ? do_dup2+0x450/0x450 [ 1272.515328] ? vfs_write+0x393/0x540 [ 1272.519045] ? fput+0x2b/0x190 [ 1272.522244] ksys_ioctl+0x9b/0xc0 [ 1272.525702] __x64_sys_ioctl+0x6f/0xb0 [ 1272.529680] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1272.534262] do_syscall_64+0xf9/0x620 [ 1272.539024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1272.544215] RIP: 0033:0x4665f9 [ 1272.547410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:50:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1272.566394] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1272.574199] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1272.581470] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1272.588737] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1272.596185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1272.603461] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:08 executing program 3 (fault-call:9 fault-nth:10): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002500200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1272.889272] ISOFS: unable to read i-node block [ 1272.906190] FAULT_INJECTION: forcing a failure. [ 1272.906190] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.937145] isofs_fill_super: get root inode failed [ 1272.986386] CPU: 0 PID: 29922 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1272.994309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.003663] Call Trace: [ 1273.006268] dump_stack+0x1fc/0x2ef [ 1273.009904] should_fail.cold+0xa/0xf [ 1273.013697] ? setup_fault_attr+0x200/0x200 [ 1273.018016] ? lock_acquire+0x170/0x3c0 [ 1273.022019] __should_failslab+0x115/0x180 [ 1273.026257] should_failslab+0x5/0x10 [ 1273.030046] kmem_cache_alloc+0x277/0x370 [ 1273.034188] mmu_topup_memory_caches+0x8f/0x370 [ 1273.038848] kvm_mmu_load+0x1e/0x1200 [ 1273.042638] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1273.047554] ? construct_eptp+0x3b0/0x3b0 [ 1273.051701] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1273.056538] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1273.061480] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1273.066311] ? get_task_pid+0x143/0x2a0 [ 1273.070279] ? lock_downgrade+0x720/0x720 [ 1273.074414] ? check_preemption_disabled+0x41/0x280 [ 1273.079430] ? check_preemption_disabled+0x41/0x280 [ 1273.084460] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1273.088595] kvm_vcpu_ioctl+0x493/0xe10 [ 1273.092559] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1273.098444] ? get_pid_task+0xf4/0x190 [ 1273.102325] ? mark_held_locks+0xf0/0xf0 [ 1273.106385] ? proc_fail_nth_write+0x95/0x1d0 [ 1273.110880] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1273.115899] ? ksys_write+0x241/0x2a0 [ 1273.119706] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1273.125583] do_vfs_ioctl+0xcdb/0x12e0 [ 1273.129464] ? lock_downgrade+0x720/0x720 [ 1273.133603] ? check_preemption_disabled+0x41/0x280 [ 1273.138607] ? ioctl_preallocate+0x200/0x200 [ 1273.143008] ? __fget+0x356/0x510 [ 1273.146538] ? do_dup2+0x450/0x450 [ 1273.150067] ? vfs_write+0x393/0x540 [ 1273.153769] ? fput+0x2b/0x190 [ 1273.156970] ksys_ioctl+0x9b/0xc0 [ 1273.160414] __x64_sys_ioctl+0x6f/0xb0 [ 1273.164312] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1273.168887] do_syscall_64+0xf9/0x620 [ 1273.172680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.178026] RIP: 0033:0x4665f9 [ 1273.181220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1273.200197] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1273.207984] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1273.215247] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1273.222499] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1273.229757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1273.237019] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020003200200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:11 executing program 3 (fault-call:9 fault-nth:11): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f92, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1275.291540] ISOFS: unable to read i-node block 09:50:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1275.317003] isofs_fill_super: get root inode failed [ 1275.357622] FAULT_INJECTION: forcing a failure. [ 1275.357622] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.370508] CPU: 1 PID: 29961 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1275.378400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.387754] Call Trace: [ 1275.390357] dump_stack+0x1fc/0x2ef [ 1275.393982] should_fail.cold+0xa/0xf [ 1275.397773] ? setup_fault_attr+0x200/0x200 [ 1275.402085] ? lock_acquire+0x170/0x3c0 [ 1275.406100] __should_failslab+0x115/0x180 [ 1275.410327] should_failslab+0x5/0x10 [ 1275.414114] kmem_cache_alloc+0x277/0x370 [ 1275.418250] mmu_topup_memory_caches+0x8f/0x370 [ 1275.422909] kvm_mmu_load+0x1e/0x1200 [ 1275.426697] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1275.431609] ? construct_eptp+0x3b0/0x3b0 [ 1275.435743] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1275.440580] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1275.445508] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1275.450426] ? get_task_pid+0x143/0x2a0 [ 1275.454390] ? lock_downgrade+0x720/0x720 [ 1275.458525] ? check_preemption_disabled+0x41/0x280 [ 1275.463535] ? check_preemption_disabled+0x41/0x280 [ 1275.468566] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1275.472699] kvm_vcpu_ioctl+0x493/0xe10 [ 1275.476661] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1275.482540] ? get_pid_task+0xf4/0x190 [ 1275.486415] ? mark_held_locks+0xf0/0xf0 [ 1275.490461] ? proc_fail_nth_write+0x95/0x1d0 [ 1275.494947] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1275.499896] ? ksys_write+0x241/0x2a0 [ 1275.503785] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1275.509660] do_vfs_ioctl+0xcdb/0x12e0 [ 1275.513537] ? lock_downgrade+0x720/0x720 [ 1275.517673] ? check_preemption_disabled+0x41/0x280 [ 1275.522675] ? ioctl_preallocate+0x200/0x200 [ 1275.527072] ? __fget+0x356/0x510 [ 1275.530514] ? do_dup2+0x450/0x450 [ 1275.534041] ? vfs_write+0x393/0x540 [ 1275.537754] ? fput+0x2b/0x190 [ 1275.540943] ksys_ioctl+0x9b/0xc0 [ 1275.544386] __x64_sys_ioctl+0x6f/0xb0 [ 1275.548260] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1275.552827] do_syscall_64+0xf9/0x620 [ 1275.556618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1275.561796] RIP: 0033:0x4665f9 [ 1275.564975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1275.583858] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1275.591651] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1275.598903] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1275.606181] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1275.613442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.620711] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:11 executing program 3 (fault-call:9 fault-nth:12): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4f", 0x27, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1275.762422] FAULT_INJECTION: forcing a failure. [ 1275.762422] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.794377] CPU: 1 PID: 29979 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1275.802290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.811644] Call Trace: [ 1275.814246] dump_stack+0x1fc/0x2ef [ 1275.817884] should_fail.cold+0xa/0xf [ 1275.821692] ? setup_fault_attr+0x200/0x200 [ 1275.826054] ? lock_acquire+0x170/0x3c0 [ 1275.830170] __should_failslab+0x115/0x180 [ 1275.834416] should_failslab+0x5/0x10 [ 1275.838395] kmem_cache_alloc+0x277/0x370 [ 1275.842566] mmu_topup_memory_caches+0x8f/0x370 [ 1275.847243] kvm_mmu_load+0x1e/0x1200 [ 1275.851051] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1275.855984] ? construct_eptp+0x3b0/0x3b0 [ 1275.860137] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1275.864998] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1275.869973] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1275.874820] ? get_task_pid+0x143/0x2a0 [ 1275.878806] ? lock_downgrade+0x720/0x720 [ 1275.882962] ? check_preemption_disabled+0x41/0x280 [ 1275.887998] ? check_preemption_disabled+0x41/0x280 [ 1275.893114] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1275.897263] kvm_vcpu_ioctl+0x493/0xe10 [ 1275.901240] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1275.907130] ? get_pid_task+0xf4/0x190 [ 1275.911064] ? mark_held_locks+0xf0/0xf0 [ 1275.915127] ? proc_fail_nth_write+0x95/0x1d0 [ 1275.919799] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1275.924849] ? ksys_write+0x241/0x2a0 [ 1275.928763] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1275.934695] do_vfs_ioctl+0xcdb/0x12e0 [ 1275.938593] ? lock_downgrade+0x720/0x720 [ 1275.942832] ? check_preemption_disabled+0x41/0x280 [ 1275.948464] ? ioctl_preallocate+0x200/0x200 [ 1275.952883] ? __fget+0x356/0x510 [ 1275.956372] ? do_dup2+0x450/0x450 [ 1275.959929] ? vfs_write+0x393/0x540 [ 1275.963648] ? fput+0x2b/0x190 [ 1275.966868] ksys_ioctl+0x9b/0xc0 [ 1275.970336] __x64_sys_ioctl+0x6f/0xb0 [ 1275.974404] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1275.978989] do_syscall_64+0xf9/0x620 [ 1275.982886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1275.988081] RIP: 0033:0x4665f9 [ 1275.991273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:50:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020003700200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1276.010210] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.018016] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1276.025297] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1276.032594] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1276.039863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1276.047132] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:11 executing program 3 (fault-call:9 fault-nth:13): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1276.203534] ISOFS: unable to read i-node block [ 1276.228489] isofs_fill_super: get root inode failed [ 1276.269327] FAULT_INJECTION: forcing a failure. [ 1276.269327] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.280793] CPU: 1 PID: 30003 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1276.288767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.298132] Call Trace: [ 1276.300727] dump_stack+0x1fc/0x2ef [ 1276.304374] should_fail.cold+0xa/0xf [ 1276.308189] ? setup_fault_attr+0x200/0x200 [ 1276.312528] ? lock_acquire+0x170/0x3c0 [ 1276.316518] __should_failslab+0x115/0x180 [ 1276.320762] should_failslab+0x5/0x10 [ 1276.324561] kmem_cache_alloc+0x277/0x370 [ 1276.328696] mmu_topup_memory_caches+0x8f/0x370 [ 1276.333351] kvm_mmu_load+0x1e/0x1200 [ 1276.337147] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1276.342072] ? construct_eptp+0x3b0/0x3b0 [ 1276.346211] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1276.351058] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1276.356007] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1276.360842] ? get_task_pid+0x143/0x2a0 [ 1276.364818] ? lock_downgrade+0x720/0x720 [ 1276.368955] ? check_preemption_disabled+0x41/0x280 [ 1276.373953] ? check_preemption_disabled+0x41/0x280 [ 1276.378971] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1276.383124] kvm_vcpu_ioctl+0x493/0xe10 [ 1276.387095] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1276.392972] ? get_pid_task+0xf4/0x190 [ 1276.396863] ? mark_held_locks+0xf0/0xf0 [ 1276.400932] ? proc_fail_nth_write+0x95/0x1d0 [ 1276.405485] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1276.410413] ? ksys_write+0x241/0x2a0 [ 1276.414198] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1276.420072] do_vfs_ioctl+0xcdb/0x12e0 [ 1276.423946] ? lock_downgrade+0x720/0x720 [ 1276.428078] ? check_preemption_disabled+0x41/0x280 [ 1276.433097] ? ioctl_preallocate+0x200/0x200 [ 1276.437505] ? __fget+0x356/0x510 [ 1276.440953] ? do_dup2+0x450/0x450 [ 1276.444477] ? vfs_write+0x393/0x540 [ 1276.448174] ? fput+0x2b/0x190 [ 1276.451364] ksys_ioctl+0x9b/0xc0 [ 1276.454843] __x64_sys_ioctl+0x6f/0xb0 [ 1276.458827] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1276.463413] do_syscall_64+0xf9/0x620 [ 1276.467211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.472386] RIP: 0033:0x4665f9 [ 1276.475571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.494736] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.502466] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1276.509998] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1276.517255] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1276.524602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1276.531947] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4f", 0x27, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f93, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000fffffff6000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:14 executing program 3 (fault-call:9 fault-nth:14): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020004400200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1278.373938] FAULT_INJECTION: forcing a failure. [ 1278.373938] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.386738] CPU: 0 PID: 30028 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1278.394648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.404006] Call Trace: [ 1278.406606] dump_stack+0x1fc/0x2ef [ 1278.410248] should_fail.cold+0xa/0xf [ 1278.414061] ? setup_fault_attr+0x200/0x200 [ 1278.418393] ? lock_acquire+0x170/0x3c0 [ 1278.422386] __should_failslab+0x115/0x180 [ 1278.426639] should_failslab+0x5/0x10 [ 1278.430467] kmem_cache_alloc+0x277/0x370 [ 1278.434796] mmu_topup_memory_caches+0x8f/0x370 [ 1278.439474] kvm_mmu_load+0x1e/0x1200 [ 1278.443279] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1278.451008] ? construct_eptp+0x3b0/0x3b0 [ 1278.455260] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1278.460123] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1278.465082] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1278.469928] ? get_task_pid+0x143/0x2a0 [ 1278.473910] ? lock_downgrade+0x720/0x720 [ 1278.478077] ? check_preemption_disabled+0x41/0x280 [ 1278.483103] ? check_preemption_disabled+0x41/0x280 [ 1278.488132] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1278.492286] kvm_vcpu_ioctl+0x493/0xe10 [ 1278.496272] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1278.502170] ? get_pid_task+0xf4/0x190 [ 1278.506061] ? mark_held_locks+0xf0/0xf0 [ 1278.510121] ? proc_fail_nth_write+0x95/0x1d0 [ 1278.514662] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1278.519611] ? ksys_write+0x241/0x2a0 [ 1278.523427] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1278.529314] do_vfs_ioctl+0xcdb/0x12e0 [ 1278.533209] ? lock_downgrade+0x720/0x720 [ 1278.537364] ? check_preemption_disabled+0x41/0x280 [ 1278.542423] ? ioctl_preallocate+0x200/0x200 [ 1278.546839] ? __fget+0x356/0x510 [ 1278.550298] ? do_dup2+0x450/0x450 [ 1278.553841] ? vfs_write+0x393/0x540 [ 1278.557586] ? fput+0x2b/0x190 [ 1278.560802] ksys_ioctl+0x9b/0xc0 [ 1278.564288] __x64_sys_ioctl+0x6f/0xb0 [ 1278.568181] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1278.572767] do_syscall_64+0xf9/0x620 [ 1278.576572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.581770] RIP: 0033:0x4665f9 [ 1278.584964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.603867] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1278.611758] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1278.619032] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1278.626306] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.633773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.641051] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4f", 0x27, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1278.676161] ISOFS: unable to read i-node block [ 1278.717407] isofs_fill_super: get root inode failed 09:50:14 executing program 3 (fault-call:9 fault-nth:15): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020006000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1278.886357] FAULT_INJECTION: forcing a failure. [ 1278.886357] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.897986] CPU: 0 PID: 30062 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1278.906144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.915504] Call Trace: [ 1278.918108] dump_stack+0x1fc/0x2ef [ 1278.921758] should_fail.cold+0xa/0xf [ 1278.925587] ? setup_fault_attr+0x200/0x200 [ 1278.929930] ? lock_acquire+0x170/0x3c0 [ 1278.933922] __should_failslab+0x115/0x180 [ 1278.938278] should_failslab+0x5/0x10 [ 1278.942084] kmem_cache_alloc+0x277/0x370 [ 1278.946244] mmu_topup_memory_caches+0x8f/0x370 [ 1278.950929] kvm_mmu_load+0x1e/0x1200 [ 1278.954758] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1278.959700] ? construct_eptp+0x3b0/0x3b0 [ 1278.963883] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1278.968743] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1278.973694] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1278.978578] ? get_task_pid+0x143/0x2a0 [ 1278.982564] ? lock_downgrade+0x720/0x720 [ 1278.986717] ? check_preemption_disabled+0x41/0x280 [ 1278.991743] ? check_preemption_disabled+0x41/0x280 [ 1278.996773] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1279.000924] kvm_vcpu_ioctl+0x493/0xe10 [ 1279.004904] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1279.010802] ? get_pid_task+0xf4/0x190 [ 1279.014695] ? mark_held_locks+0xf0/0xf0 [ 1279.018758] ? proc_fail_nth_write+0x95/0x1d0 [ 1279.023262] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1279.028237] ? ksys_write+0x241/0x2a0 [ 1279.032041] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1279.037941] do_vfs_ioctl+0xcdb/0x12e0 [ 1279.041832] ? lock_downgrade+0x720/0x720 [ 1279.045982] ? check_preemption_disabled+0x41/0x280 [ 1279.050999] ? ioctl_preallocate+0x200/0x200 [ 1279.055435] ? __fget+0x356/0x510 [ 1279.058892] ? do_dup2+0x450/0x450 [ 1279.062429] ? vfs_write+0x393/0x540 [ 1279.066177] ? fput+0x2b/0x190 [ 1279.069382] ksys_ioctl+0x9b/0xc0 [ 1279.072842] __x64_sys_ioctl+0x6f/0xb0 [ 1279.076734] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1279.081316] do_syscall_64+0xf9/0x620 [ 1279.085138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.090326] RIP: 0033:0x4665f9 [ 1279.093555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1279.112468] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1279.120279] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1279.127559] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1279.134836] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1279.142108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1279.149382] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1279.210592] ISOFS: unable to read i-node block [ 1279.217763] isofs_fill_super: get root inode failed 09:50:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f94, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:17 executing program 3 (fault-call:9 fault-nth:16): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000ffffffff000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020008e03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1281.428673] FAULT_INJECTION: forcing a failure. [ 1281.428673] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.471661] ISOFS: unable to read i-node block [ 1281.477356] isofs_fill_super: get root inode failed [ 1281.492941] CPU: 0 PID: 30105 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1281.500845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.510203] Call Trace: [ 1281.512805] dump_stack+0x1fc/0x2ef [ 1281.516444] should_fail.cold+0xa/0xf [ 1281.520261] ? setup_fault_attr+0x200/0x200 [ 1281.524593] ? lock_acquire+0x170/0x3c0 [ 1281.528587] __should_failslab+0x115/0x180 [ 1281.532836] should_failslab+0x5/0x10 [ 1281.536647] kmem_cache_alloc+0x277/0x370 [ 1281.540803] mmu_topup_memory_caches+0x8f/0x370 [ 1281.545484] kvm_mmu_load+0x1e/0x1200 [ 1281.549291] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1281.554226] ? construct_eptp+0x3b0/0x3b0 [ 1281.558394] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1281.563256] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1281.568211] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1281.573073] ? get_task_pid+0x143/0x2a0 [ 1281.577058] ? lock_downgrade+0x720/0x720 [ 1281.581309] ? check_preemption_disabled+0x41/0x280 [ 1281.586333] ? check_preemption_disabled+0x41/0x280 [ 1281.591363] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1281.595514] kvm_vcpu_ioctl+0x493/0xe10 [ 1281.599493] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1281.605385] ? get_pid_task+0xf4/0x190 [ 1281.609278] ? mark_held_locks+0xf0/0xf0 [ 1281.613344] ? proc_fail_nth_write+0x95/0x1d0 [ 1281.617938] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1281.622885] ? ksys_write+0x241/0x2a0 [ 1281.626780] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1281.632856] do_vfs_ioctl+0xcdb/0x12e0 [ 1281.636748] ? lock_downgrade+0x720/0x720 [ 1281.640900] ? check_preemption_disabled+0x41/0x280 [ 1281.645923] ? ioctl_preallocate+0x200/0x200 [ 1281.650339] ? __fget+0x356/0x510 [ 1281.653799] ? do_dup2+0x450/0x450 [ 1281.657338] ? vfs_write+0x393/0x540 [ 1281.661058] ? fput+0x2b/0x190 [ 1281.664259] ksys_ioctl+0x9b/0xc0 [ 1281.667722] __x64_sys_ioctl+0x6f/0xb0 [ 1281.671615] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1281.676200] do_syscall_64+0xf9/0x620 [ 1281.680010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.685466] RIP: 0033:0x4665f9 [ 1281.688663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1281.707565] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1281.715303] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 09:50:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000010132088ffffffff000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1281.722574] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1281.729845] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1281.737215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1281.744488] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:17 executing program 3 (fault-call:9 fault-nth:17): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1281.836865] ISOFS: unable to read i-node block [ 1281.844574] isofs_fill_super: get root inode failed 09:50:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020008f03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1282.017037] FAULT_INJECTION: forcing a failure. [ 1282.017037] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.040650] CPU: 1 PID: 30140 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1282.048575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.057940] Call Trace: [ 1282.060540] dump_stack+0x1fc/0x2ef [ 1282.064180] should_fail.cold+0xa/0xf [ 1282.067993] ? setup_fault_attr+0x200/0x200 [ 1282.072320] ? lock_acquire+0x170/0x3c0 [ 1282.076305] __should_failslab+0x115/0x180 [ 1282.080544] should_failslab+0x5/0x10 [ 1282.084346] kmem_cache_alloc+0x277/0x370 [ 1282.088504] mmu_topup_memory_caches+0x8f/0x370 [ 1282.093277] kvm_mmu_load+0x1e/0x1200 [ 1282.097247] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1282.102206] ? construct_eptp+0x3b0/0x3b0 [ 1282.106358] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1282.111214] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1282.116166] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1282.121013] ? get_task_pid+0x143/0x2a0 [ 1282.124998] ? lock_downgrade+0x720/0x720 [ 1282.129263] ? check_preemption_disabled+0x41/0x280 [ 1282.134294] ? check_preemption_disabled+0x41/0x280 [ 1282.139674] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1282.143827] kvm_vcpu_ioctl+0x493/0xe10 [ 1282.147816] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1282.153713] ? get_pid_task+0xf4/0x190 [ 1282.157609] ? mark_held_locks+0xf0/0xf0 [ 1282.161849] ? proc_fail_nth_write+0x95/0x1d0 [ 1282.166348] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1282.171295] ? ksys_write+0x241/0x2a0 [ 1282.175100] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1282.180995] do_vfs_ioctl+0xcdb/0x12e0 [ 1282.184886] ? lock_downgrade+0x720/0x720 [ 1282.189038] ? check_preemption_disabled+0x41/0x280 [ 1282.194058] ? ioctl_preallocate+0x200/0x200 [ 1282.198473] ? __fget+0x356/0x510 [ 1282.201944] ? do_dup2+0x450/0x450 [ 1282.205484] ? vfs_write+0x393/0x540 [ 1282.209203] ? fput+0x2b/0x190 [ 1282.212409] ksys_ioctl+0x9b/0xc0 [ 1282.215872] __x64_sys_ioctl+0x6f/0xb0 [ 1282.219854] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1282.224441] do_syscall_64+0xf9/0x620 [ 1282.228252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.233441] RIP: 0033:0x4665f9 [ 1282.236637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.255539] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.263525] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1282.270802] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1282.278161] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.285439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.292710] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000002000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009003200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f95, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 3 (fault-call:9 fault-nth:18): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1284.401179] ISOFS: unable to read i-node block [ 1284.410417] isofs_fill_super: get root inode failed 09:50:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1284.460418] FAULT_INJECTION: forcing a failure. [ 1284.460418] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.513958] CPU: 0 PID: 30166 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1284.521973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.531336] Call Trace: [ 1284.533935] dump_stack+0x1fc/0x2ef [ 1284.537576] should_fail.cold+0xa/0xf [ 1284.541385] ? setup_fault_attr+0x200/0x200 [ 1284.545712] ? lock_acquire+0x170/0x3c0 [ 1284.549701] __should_failslab+0x115/0x180 [ 1284.553946] should_failslab+0x5/0x10 [ 1284.557755] kmem_cache_alloc+0x277/0x370 [ 1284.561917] mmu_topup_memory_caches+0x8f/0x370 [ 1284.566596] kvm_mmu_load+0x1e/0x1200 [ 1284.570405] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1284.575345] ? construct_eptp+0x3b0/0x3b0 [ 1284.579497] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1284.584365] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1284.589321] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1284.594171] ? get_task_pid+0x143/0x2a0 [ 1284.598157] ? lock_downgrade+0x720/0x720 [ 1284.602310] ? check_preemption_disabled+0x41/0x280 [ 1284.607383] ? check_preemption_disabled+0x41/0x280 [ 1284.612414] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1284.616565] kvm_vcpu_ioctl+0x493/0xe10 [ 1284.620549] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1284.626443] ? get_pid_task+0xf4/0x190 [ 1284.630337] ? mark_held_locks+0xf0/0xf0 [ 1284.634411] ? proc_fail_nth_write+0x95/0x1d0 [ 1284.638908] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1284.643851] ? ksys_write+0x241/0x2a0 [ 1284.647655] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1284.653546] do_vfs_ioctl+0xcdb/0x12e0 [ 1284.657439] ? lock_downgrade+0x720/0x720 [ 1284.661594] ? check_preemption_disabled+0x41/0x280 [ 1284.666616] ? ioctl_preallocate+0x200/0x200 [ 1284.671034] ? __fget+0x356/0x510 [ 1284.674557] ? do_dup2+0x450/0x450 [ 1284.678101] ? vfs_write+0x393/0x540 [ 1284.681823] ? fput+0x2b/0x190 [ 1284.685027] ksys_ioctl+0x9b/0xc0 [ 1284.688486] __x64_sys_ioctl+0x6f/0xb0 [ 1284.692378] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1284.696966] do_syscall_64+0xf9/0x620 [ 1284.700782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.705970] RIP: 0033:0x4665f9 [ 1284.709169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.728170] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1284.735888] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1284.743161] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1284.750519] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1284.757789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 09:50:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1284.765063] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009103200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 3 (fault-call:9 fault-nth:19): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1285.085860] ISOFS: unable to read i-node block [ 1285.090500] isofs_fill_super: get root inode failed [ 1285.100316] FAULT_INJECTION: forcing a failure. [ 1285.100316] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.144596] CPU: 0 PID: 30213 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1285.152567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.161928] Call Trace: [ 1285.164531] dump_stack+0x1fc/0x2ef [ 1285.168177] should_fail.cold+0xa/0xf [ 1285.172172] ? setup_fault_attr+0x200/0x200 [ 1285.176501] ? lock_acquire+0x170/0x3c0 [ 1285.180489] __should_failslab+0x115/0x180 [ 1285.184729] should_failslab+0x5/0x10 [ 1285.188539] kmem_cache_alloc+0x277/0x370 [ 1285.192695] mmu_topup_memory_caches+0x8f/0x370 [ 1285.197378] kvm_mmu_load+0x1e/0x1200 [ 1285.201191] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1285.206127] ? construct_eptp+0x3b0/0x3b0 [ 1285.210287] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1285.215147] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1285.220206] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1285.225056] ? get_task_pid+0x143/0x2a0 [ 1285.229045] ? lock_downgrade+0x720/0x720 [ 1285.233202] ? check_preemption_disabled+0x41/0x280 [ 1285.238249] ? check_preemption_disabled+0x41/0x280 [ 1285.243291] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1285.247451] kvm_vcpu_ioctl+0x493/0xe10 [ 1285.251441] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1285.257340] ? get_pid_task+0xf4/0x190 [ 1285.261273] ? mark_held_locks+0xf0/0xf0 [ 1285.265343] ? proc_fail_nth_write+0x95/0x1d0 [ 1285.269844] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1285.274790] ? ksys_write+0x241/0x2a0 [ 1285.278599] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1285.284489] do_vfs_ioctl+0xcdb/0x12e0 [ 1285.288385] ? lock_downgrade+0x720/0x720 [ 1285.292537] ? check_preemption_disabled+0x41/0x280 [ 1285.297560] ? ioctl_preallocate+0x200/0x200 [ 1285.301974] ? __fget+0x356/0x510 [ 1285.305439] ? do_dup2+0x450/0x450 [ 1285.309170] ? vfs_write+0x393/0x540 [ 1285.312889] ? fput+0x2b/0x190 [ 1285.316095] ksys_ioctl+0x9b/0xc0 [ 1285.319556] __x64_sys_ioctl+0x6f/0xb0 [ 1285.323451] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1285.328035] do_syscall_64+0xf9/0x620 [ 1285.331847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.337041] RIP: 0033:0x4665f9 09:50:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f96, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1285.340242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.359405] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1285.367190] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1285.374551] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1285.381988] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 09:50:21 executing program 3 (fault-call:9 fault-nth:20): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1285.389333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.396613] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 [ 1285.513057] FAULT_INJECTION: forcing a failure. [ 1285.513057] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.525149] CPU: 0 PID: 30237 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1285.533051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.542414] Call Trace: [ 1285.545017] dump_stack+0x1fc/0x2ef [ 1285.548658] should_fail.cold+0xa/0xf [ 1285.552559] ? setup_fault_attr+0x200/0x200 [ 1285.556901] ? lock_acquire+0x170/0x3c0 [ 1285.560888] __should_failslab+0x115/0x180 [ 1285.565129] should_failslab+0x5/0x10 [ 1285.568935] kmem_cache_alloc+0x277/0x370 [ 1285.573094] mmu_topup_memory_caches+0x8f/0x370 [ 1285.577772] kvm_mmu_load+0x1e/0x1200 [ 1285.581602] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1285.586538] ? construct_eptp+0x3b0/0x3b0 [ 1285.590694] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1285.595553] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1285.600510] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1285.605369] ? get_task_pid+0x143/0x2a0 [ 1285.609352] ? lock_downgrade+0x720/0x720 [ 1285.613504] ? check_preemption_disabled+0x41/0x280 [ 1285.618529] ? check_preemption_disabled+0x41/0x280 [ 1285.623562] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1285.627712] kvm_vcpu_ioctl+0x493/0xe10 [ 1285.631703] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1285.637598] ? get_pid_task+0xf4/0x190 [ 1285.641491] ? mark_held_locks+0xf0/0xf0 [ 1285.645561] ? proc_fail_nth_write+0x95/0x1d0 [ 1285.650062] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1285.655019] ? ksys_write+0x241/0x2a0 [ 1285.658826] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1285.664758] do_vfs_ioctl+0xcdb/0x12e0 [ 1285.668659] ? lock_downgrade+0x720/0x720 [ 1285.672816] ? check_preemption_disabled+0x41/0x280 [ 1285.677840] ? ioctl_preallocate+0x200/0x200 [ 1285.682262] ? __fget+0x356/0x510 [ 1285.685722] ? do_dup2+0x450/0x450 [ 1285.689267] ? vfs_write+0x393/0x540 [ 1285.692988] ? fput+0x2b/0x190 [ 1285.696231] ksys_ioctl+0x9b/0xc0 [ 1285.699698] __x64_sys_ioctl+0x6f/0xb0 [ 1285.703593] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1285.708176] do_syscall_64+0xf9/0x620 [ 1285.712244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.717451] RIP: 0033:0x4665f9 [ 1285.720666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.739663] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1285.747381] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1285.754768] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1285.762042] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.769314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.776679] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:21 executing program 3 (fault-call:9 fault-nth:21): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1285.962252] FAULT_INJECTION: forcing a failure. [ 1285.962252] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.000574] CPU: 1 PID: 30246 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1286.008722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.018175] Call Trace: [ 1286.020784] dump_stack+0x1fc/0x2ef [ 1286.024430] should_fail.cold+0xa/0xf [ 1286.028269] ? setup_fault_attr+0x200/0x200 [ 1286.032604] ? lock_acquire+0x170/0x3c0 [ 1286.036764] __should_failslab+0x115/0x180 [ 1286.041010] should_failslab+0x5/0x10 [ 1286.044915] kmem_cache_alloc+0x277/0x370 [ 1286.049074] mmu_topup_memory_caches+0x8f/0x370 [ 1286.053762] kvm_mmu_load+0x1e/0x1200 [ 1286.057572] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1286.062607] ? construct_eptp+0x3b0/0x3b0 [ 1286.066762] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1286.071620] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1286.076572] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1286.081522] ? get_task_pid+0x143/0x2a0 [ 1286.085509] ? lock_downgrade+0x720/0x720 [ 1286.089667] ? check_preemption_disabled+0x41/0x280 [ 1286.094696] ? check_preemption_disabled+0x41/0x280 [ 1286.099728] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1286.103880] kvm_vcpu_ioctl+0x493/0xe10 [ 1286.107883] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1286.113783] ? get_pid_task+0xf4/0x190 [ 1286.117681] ? mark_held_locks+0xf0/0xf0 [ 1286.121756] ? proc_fail_nth_write+0x95/0x1d0 [ 1286.126269] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1286.131221] ? ksys_write+0x241/0x2a0 [ 1286.135039] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1286.140938] do_vfs_ioctl+0xcdb/0x12e0 [ 1286.144841] ? lock_downgrade+0x720/0x720 [ 1286.149005] ? check_preemption_disabled+0x41/0x280 [ 1286.154036] ? ioctl_preallocate+0x200/0x200 [ 1286.158457] ? __fget+0x356/0x510 [ 1286.161933] ? do_dup2+0x450/0x450 [ 1286.165689] ? vfs_write+0x393/0x540 [ 1286.169415] ? fput+0x2b/0x190 [ 1286.172630] ksys_ioctl+0x9b/0xc0 [ 1286.176098] __x64_sys_ioctl+0x6f/0xb0 [ 1286.179995] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1286.184599] do_syscall_64+0xf9/0x620 [ 1286.188434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.193634] RIP: 0033:0x4665f9 [ 1286.196833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.215894] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1286.223770] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1286.231055] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1286.238336] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.245620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.252902] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009203200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:23 executing program 3 (fault-call:9 fault-nth:22): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f97, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1287.939685] ISOFS: unable to read i-node block [ 1287.960319] isofs_fill_super: get root inode failed [ 1287.993193] FAULT_INJECTION: forcing a failure. [ 1287.993193] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.005772] CPU: 0 PID: 30285 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1288.013678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.023037] Call Trace: [ 1288.025648] dump_stack+0x1fc/0x2ef [ 1288.029330] should_fail.cold+0xa/0xf [ 1288.033146] ? setup_fault_attr+0x200/0x200 [ 1288.037475] ? lock_acquire+0x170/0x3c0 [ 1288.041552] __should_failslab+0x115/0x180 [ 1288.045800] should_failslab+0x5/0x10 [ 1288.049618] kmem_cache_alloc+0x277/0x370 [ 1288.053777] mmu_topup_memory_caches+0x8f/0x370 [ 1288.058459] kvm_mmu_load+0x1e/0x1200 [ 1288.062266] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1288.067288] ? construct_eptp+0x3b0/0x3b0 [ 1288.071440] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1288.076297] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1288.081361] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1288.086213] ? get_task_pid+0x143/0x2a0 [ 1288.090199] ? lock_downgrade+0x720/0x720 [ 1288.094353] ? check_preemption_disabled+0x41/0x280 [ 1288.099381] ? check_preemption_disabled+0x41/0x280 [ 1288.104408] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1288.108561] kvm_vcpu_ioctl+0x493/0xe10 [ 1288.112550] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1288.118619] ? get_pid_task+0xf4/0x190 [ 1288.122549] ? mark_held_locks+0xf0/0xf0 [ 1288.126629] ? proc_fail_nth_write+0x95/0x1d0 [ 1288.131187] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1288.136142] ? ksys_write+0x241/0x2a0 [ 1288.140030] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1288.146020] do_vfs_ioctl+0xcdb/0x12e0 [ 1288.149924] ? lock_downgrade+0x720/0x720 [ 1288.154081] ? check_preemption_disabled+0x41/0x280 [ 1288.159105] ? ioctl_preallocate+0x200/0x200 [ 1288.163528] ? __fget+0x356/0x510 [ 1288.166993] ? do_dup2+0x450/0x450 [ 1288.170542] ? vfs_write+0x393/0x540 [ 1288.174260] ? fput+0x2b/0x190 [ 1288.177469] ksys_ioctl+0x9b/0xc0 [ 1288.180939] __x64_sys_ioctl+0x6f/0xb0 [ 1288.184833] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1288.189507] do_syscall_64+0xf9/0x620 [ 1288.193327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.198520] RIP: 0033:0x4665f9 [ 1288.201716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1288.220795] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1288.228597] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1288.235881] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 09:50:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1288.243367] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1288.250643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1288.258182] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:24 executing program 3 (fault-call:9 fault-nth:23): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009303200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1288.475925] FAULT_INJECTION: forcing a failure. [ 1288.475925] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.513785] CPU: 1 PID: 30309 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1288.521719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.531153] Call Trace: [ 1288.533760] dump_stack+0x1fc/0x2ef [ 1288.537399] should_fail.cold+0xa/0xf [ 1288.541215] ? setup_fault_attr+0x200/0x200 [ 1288.545545] ? lock_acquire+0x170/0x3c0 [ 1288.549551] __should_failslab+0x115/0x180 [ 1288.553802] should_failslab+0x5/0x10 [ 1288.557608] kmem_cache_alloc+0x277/0x370 [ 1288.561767] mmu_topup_memory_caches+0x8f/0x370 [ 1288.566450] kvm_mmu_load+0x1e/0x1200 [ 1288.570257] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1288.575284] ? construct_eptp+0x3b0/0x3b0 [ 1288.579493] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1288.584348] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1288.589433] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1288.594279] ? get_task_pid+0x143/0x2a0 [ 1288.598268] ? lock_downgrade+0x720/0x720 [ 1288.602424] ? check_preemption_disabled+0x41/0x280 [ 1288.607452] ? check_preemption_disabled+0x41/0x280 [ 1288.612481] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1288.616767] kvm_vcpu_ioctl+0x493/0xe10 [ 1288.620752] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1288.626661] ? get_pid_task+0xf4/0x190 [ 1288.630574] ? mark_held_locks+0xf0/0xf0 [ 1288.634639] ? proc_fail_nth_write+0x95/0x1d0 [ 1288.639228] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1288.644278] ? ksys_write+0x241/0x2a0 [ 1288.648092] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1288.654433] do_vfs_ioctl+0xcdb/0x12e0 [ 1288.658330] ? lock_downgrade+0x720/0x720 [ 1288.662586] ? check_preemption_disabled+0x41/0x280 [ 1288.667611] ? ioctl_preallocate+0x200/0x200 [ 1288.672041] ? __fget+0x356/0x510 [ 1288.675505] ? do_dup2+0x450/0x450 [ 1288.679063] ? vfs_write+0x393/0x540 [ 1288.682792] ? fput+0x2b/0x190 [ 1288.685998] ksys_ioctl+0x9b/0xc0 [ 1288.689551] __x64_sys_ioctl+0x6f/0xb0 [ 1288.693448] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1288.698040] do_syscall_64+0xf9/0x620 [ 1288.701853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.707060] RIP: 0033:0x4665f9 [ 1288.710261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1288.729605] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1288.737323] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1288.744604] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1288.751879] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1288.759154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1288.766428] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 [ 1288.787567] ISOFS: unable to read i-node block [ 1288.804965] isofs_fill_super: get root inode failed 09:50:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:26 executing program 3 (fault-call:9 fault-nth:24): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009403200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f98, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1290.960325] ISOFS: unable to read i-node block [ 1290.974971] isofs_fill_super: get root inode failed 09:50:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1291.059220] FAULT_INJECTION: forcing a failure. [ 1291.059220] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.084478] CPU: 1 PID: 30349 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1291.092387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.101747] Call Trace: [ 1291.104347] dump_stack+0x1fc/0x2ef [ 1291.108000] should_fail.cold+0xa/0xf [ 1291.111807] ? setup_fault_attr+0x200/0x200 [ 1291.116129] ? lock_acquire+0x170/0x3c0 [ 1291.120115] __should_failslab+0x115/0x180 [ 1291.124354] should_failslab+0x5/0x10 [ 1291.128159] kmem_cache_alloc+0x277/0x370 [ 1291.132314] mmu_topup_memory_caches+0x8f/0x370 [ 1291.136993] kvm_mmu_load+0x1e/0x1200 [ 1291.140796] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1291.145814] ? construct_eptp+0x3b0/0x3b0 [ 1291.149964] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1291.154958] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1291.159918] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1291.164810] ? get_task_pid+0x143/0x2a0 [ 1291.168797] ? lock_downgrade+0x720/0x720 [ 1291.172951] ? check_preemption_disabled+0x41/0x280 [ 1291.177973] ? check_preemption_disabled+0x41/0x280 [ 1291.183003] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1291.187153] kvm_vcpu_ioctl+0x493/0xe10 [ 1291.191140] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1291.197038] ? get_pid_task+0xf4/0x190 [ 1291.200929] ? mark_held_locks+0xf0/0xf0 [ 1291.204987] ? proc_fail_nth_write+0x95/0x1d0 [ 1291.209482] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1291.214436] ? ksys_write+0x241/0x2a0 [ 1291.218509] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1291.224409] do_vfs_ioctl+0xcdb/0x12e0 [ 1291.228310] ? lock_downgrade+0x720/0x720 [ 1291.232463] ? check_preemption_disabled+0x41/0x280 [ 1291.237488] ? ioctl_preallocate+0x200/0x200 [ 1291.241913] ? __fget+0x356/0x510 [ 1291.245372] ? do_dup2+0x450/0x450 [ 1291.248914] ? vfs_write+0x393/0x540 [ 1291.252631] ? fput+0x2b/0x190 [ 1291.255835] ksys_ioctl+0x9b/0xc0 [ 1291.259295] __x64_sys_ioctl+0x6f/0xb0 [ 1291.263194] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1291.267865] do_syscall_64+0xf9/0x620 [ 1291.271679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.277019] RIP: 0033:0x4665f9 [ 1291.280215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.299117] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.306824] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1291.314206] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1291.321503] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1291.328778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1291.336049] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009503200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:27 executing program 3 (fault-call:9 fault-nth:25): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1291.476467] ISOFS: unable to read i-node block [ 1291.496536] isofs_fill_super: get root inode failed [ 1291.586896] FAULT_INJECTION: forcing a failure. [ 1291.586896] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.598815] CPU: 1 PID: 30396 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1291.606710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.616151] Call Trace: [ 1291.618748] dump_stack+0x1fc/0x2ef [ 1291.622384] should_fail.cold+0xa/0xf [ 1291.626196] ? setup_fault_attr+0x200/0x200 [ 1291.630530] ? lock_acquire+0x170/0x3c0 [ 1291.634518] __should_failslab+0x115/0x180 [ 1291.638763] should_failslab+0x5/0x10 [ 1291.642576] kmem_cache_alloc+0x277/0x370 [ 1291.646737] mmu_topup_memory_caches+0x8f/0x370 [ 1291.651422] kvm_mmu_load+0x1e/0x1200 [ 1291.655234] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1291.660169] ? construct_eptp+0x3b0/0x3b0 [ 1291.664324] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1291.669187] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1291.674145] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1291.678992] ? get_task_pid+0x143/0x2a0 [ 1291.682976] ? lock_downgrade+0x720/0x720 [ 1291.687140] ? check_preemption_disabled+0x41/0x280 [ 1291.692169] ? check_preemption_disabled+0x41/0x280 [ 1291.697202] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1291.701362] kvm_vcpu_ioctl+0x493/0xe10 [ 1291.705522] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1291.711422] ? get_pid_task+0xf4/0x190 [ 1291.715496] ? mark_held_locks+0xf0/0xf0 [ 1291.719571] ? proc_fail_nth_write+0x95/0x1d0 [ 1291.724076] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1291.729028] ? ksys_write+0x241/0x2a0 [ 1291.732843] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1291.738741] do_vfs_ioctl+0xcdb/0x12e0 [ 1291.742641] ? lock_downgrade+0x720/0x720 [ 1291.746797] ? check_preemption_disabled+0x41/0x280 [ 1291.751823] ? ioctl_preallocate+0x200/0x200 [ 1291.756252] ? __fget+0x356/0x510 [ 1291.759721] ? do_dup2+0x450/0x450 [ 1291.763271] ? vfs_write+0x393/0x540 [ 1291.767019] ? fput+0x2b/0x190 [ 1291.770316] ksys_ioctl+0x9b/0xc0 [ 1291.773782] __x64_sys_ioctl+0x6f/0xb0 [ 1291.777766] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1291.782355] do_syscall_64+0xf9/0x620 [ 1291.786172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.791365] RIP: 0033:0x4665f9 [ 1291.794646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.813561] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.821282] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1291.828560] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1291.835836] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1291.843109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1291.850384] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000240)}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32f99, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009603200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:29 executing program 3 (fault-call:9 fault-nth:26): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1294.082143] ISOFS: unable to read i-node block [ 1294.093278] isofs_fill_super: get root inode failed [ 1294.116790] FAULT_INJECTION: forcing a failure. [ 1294.116790] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.143697] CPU: 1 PID: 30425 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1294.151795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.161281] Call Trace: [ 1294.163882] dump_stack+0x1fc/0x2ef [ 1294.167620] should_fail.cold+0xa/0xf [ 1294.171436] ? setup_fault_attr+0x200/0x200 [ 1294.175766] ? lock_acquire+0x170/0x3c0 [ 1294.179752] __should_failslab+0x115/0x180 [ 1294.184026] should_failslab+0x5/0x10 [ 1294.187838] kmem_cache_alloc+0x277/0x370 [ 1294.192002] mmu_topup_memory_caches+0x8f/0x370 [ 1294.196682] kvm_mmu_load+0x1e/0x1200 [ 1294.200492] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1294.205514] ? construct_eptp+0x3b0/0x3b0 [ 1294.209758] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1294.214672] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1294.219626] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1294.224475] ? get_task_pid+0x143/0x2a0 [ 1294.228456] ? lock_downgrade+0x720/0x720 [ 1294.232618] ? check_preemption_disabled+0x41/0x280 [ 1294.237641] ? check_preemption_disabled+0x41/0x280 [ 1294.242673] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1294.246819] kvm_vcpu_ioctl+0x493/0xe10 [ 1294.250797] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1294.256688] ? get_pid_task+0xf4/0x190 [ 1294.260583] ? mark_held_locks+0xf0/0xf0 [ 1294.264643] ? proc_fail_nth_write+0x95/0x1d0 [ 1294.269144] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1294.274108] ? ksys_write+0x241/0x2a0 [ 1294.277916] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1294.283805] do_vfs_ioctl+0xcdb/0x12e0 [ 1294.287699] ? lock_downgrade+0x720/0x720 [ 1294.291851] ? check_preemption_disabled+0x41/0x280 [ 1294.296870] ? ioctl_preallocate+0x200/0x200 [ 1294.301288] ? __fget+0x356/0x510 [ 1294.304751] ? do_dup2+0x450/0x450 [ 1294.308288] ? vfs_write+0x393/0x540 [ 1294.312003] ? fput+0x2b/0x190 [ 1294.315208] ksys_ioctl+0x9b/0xc0 [ 1294.318674] __x64_sys_ioctl+0x6f/0xb0 [ 1294.322563] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1294.327154] do_syscall_64+0xf9/0x620 [ 1294.330962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.336160] RIP: 0033:0x4665f9 [ 1294.339356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.358266] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1294.365976] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1294.373332] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1294.380599] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.387865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.395222] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:30 executing program 3 (fault-call:9 fault-nth:27): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009703200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1294.609596] ISOFS: unable to read i-node block [ 1294.619975] FAULT_INJECTION: forcing a failure. [ 1294.619975] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.639375] isofs_fill_super: get root inode failed [ 1294.648188] CPU: 0 PID: 30458 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1294.656093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.665453] Call Trace: [ 1294.668056] dump_stack+0x1fc/0x2ef [ 1294.671690] should_fail.cold+0xa/0xf [ 1294.675500] ? setup_fault_attr+0x200/0x200 [ 1294.679863] ? lock_acquire+0x170/0x3c0 [ 1294.684031] __should_failslab+0x115/0x180 [ 1294.688278] should_failslab+0x5/0x10 [ 1294.692168] kmem_cache_alloc+0x277/0x370 [ 1294.696321] mmu_topup_memory_caches+0x8f/0x370 [ 1294.701088] kvm_mmu_load+0x1e/0x1200 [ 1294.704887] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1294.709814] ? construct_eptp+0x3b0/0x3b0 [ 1294.713959] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1294.718816] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1294.723769] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1294.728624] ? get_task_pid+0x143/0x2a0 [ 1294.732606] ? lock_downgrade+0x720/0x720 [ 1294.736755] ? check_preemption_disabled+0x41/0x280 [ 1294.741778] ? check_preemption_disabled+0x41/0x280 [ 1294.746804] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1294.751133] kvm_vcpu_ioctl+0x493/0xe10 [ 1294.755120] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1294.761016] ? get_pid_task+0xf4/0x190 [ 1294.764913] ? mark_held_locks+0xf0/0xf0 [ 1294.768975] ? proc_fail_nth_write+0x95/0x1d0 [ 1294.773472] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1294.778421] ? ksys_write+0x241/0x2a0 [ 1294.782228] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1294.788118] do_vfs_ioctl+0xcdb/0x12e0 [ 1294.792010] ? lock_downgrade+0x720/0x720 [ 1294.796161] ? check_preemption_disabled+0x41/0x280 [ 1294.801180] ? ioctl_preallocate+0x200/0x200 [ 1294.805593] ? __fget+0x356/0x510 [ 1294.809055] ? do_dup2+0x450/0x450 [ 1294.812768] ? vfs_write+0x393/0x540 [ 1294.816482] ? fput+0x2b/0x190 [ 1294.819680] ksys_ioctl+0x9b/0xc0 [ 1294.823144] __x64_sys_ioctl+0x6f/0xb0 [ 1294.827032] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1294.831619] do_syscall_64+0xf9/0x620 [ 1294.835427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.840616] RIP: 0033:0x4665f9 [ 1294.843809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.862729] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1294.870466] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1294.877736] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1294.885009] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.892280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.899550] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000240)}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:32 executing program 3 (fault-call:9 fault-nth:28): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009803200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x72dfecd9, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1297.092556] ISOFS: unable to read i-node block [ 1297.121607] isofs_fill_super: get root inode failed [ 1297.136208] FAULT_INJECTION: forcing a failure. [ 1297.136208] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.148745] CPU: 0 PID: 30486 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1297.156638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.166008] Call Trace: [ 1297.168607] dump_stack+0x1fc/0x2ef [ 1297.172256] should_fail.cold+0xa/0xf [ 1297.176172] ? setup_fault_attr+0x200/0x200 [ 1297.180498] ? lock_acquire+0x170/0x3c0 [ 1297.184614] __should_failslab+0x115/0x180 [ 1297.188854] should_failslab+0x5/0x10 [ 1297.192657] kmem_cache_alloc+0x277/0x370 [ 1297.196813] mmu_topup_memory_caches+0x8f/0x370 [ 1297.201574] kvm_mmu_load+0x1e/0x1200 [ 1297.205390] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1297.210320] ? construct_eptp+0x3b0/0x3b0 [ 1297.214473] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1297.219330] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1297.224276] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1297.229122] ? get_task_pid+0x143/0x2a0 [ 1297.233113] ? lock_downgrade+0x720/0x720 [ 1297.237267] ? check_preemption_disabled+0x41/0x280 [ 1297.242288] ? check_preemption_disabled+0x41/0x280 [ 1297.247498] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1297.251644] kvm_vcpu_ioctl+0x493/0xe10 [ 1297.255707] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1297.261604] ? get_pid_task+0xf4/0x190 [ 1297.265496] ? mark_held_locks+0xf0/0xf0 [ 1297.269556] ? proc_fail_nth_write+0x95/0x1d0 [ 1297.274054] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1297.279000] ? ksys_write+0x241/0x2a0 [ 1297.282809] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1297.288698] do_vfs_ioctl+0xcdb/0x12e0 [ 1297.292595] ? lock_downgrade+0x720/0x720 [ 1297.296751] ? check_preemption_disabled+0x41/0x280 [ 1297.301766] ? ioctl_preallocate+0x200/0x200 [ 1297.306183] ? __fget+0x356/0x510 [ 1297.309641] ? do_dup2+0x450/0x450 [ 1297.313180] ? vfs_write+0x393/0x540 [ 1297.316896] ? fput+0x2b/0x190 [ 1297.320096] ksys_ioctl+0x9b/0xc0 [ 1297.323554] __x64_sys_ioctl+0x6f/0xb0 [ 1297.327445] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1297.332028] do_syscall_64+0xf9/0x620 [ 1297.335836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.341040] RIP: 0033:0x4665f9 [ 1297.344321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.364273] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:50:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1297.371980] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1297.379340] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1297.386613] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1297.393894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.401161] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:33 executing program 3 (fault-call:9 fault-nth:29): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009903200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1297.592335] FAULT_INJECTION: forcing a failure. [ 1297.592335] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.618031] ISOFS: unable to read i-node block [ 1297.623249] isofs_fill_super: get root inode failed [ 1297.626010] CPU: 1 PID: 30521 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1297.636159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.645602] Call Trace: [ 1297.648202] dump_stack+0x1fc/0x2ef [ 1297.651841] should_fail.cold+0xa/0xf [ 1297.655690] ? setup_fault_attr+0x200/0x200 [ 1297.660015] ? lock_acquire+0x170/0x3c0 [ 1297.664005] __should_failslab+0x115/0x180 [ 1297.668256] should_failslab+0x5/0x10 [ 1297.672061] kmem_cache_alloc+0x277/0x370 [ 1297.676220] mmu_topup_memory_caches+0x8f/0x370 [ 1297.680938] kvm_mmu_load+0x1e/0x1200 [ 1297.684742] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1297.689697] ? construct_eptp+0x3b0/0x3b0 [ 1297.694291] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1297.699149] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1297.704109] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1297.708957] ? get_task_pid+0x143/0x2a0 [ 1297.712947] ? lock_downgrade+0x720/0x720 [ 1297.717105] ? check_preemption_disabled+0x41/0x280 [ 1297.722136] ? check_preemption_disabled+0x41/0x280 [ 1297.727166] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1297.731317] kvm_vcpu_ioctl+0x493/0xe10 [ 1297.735298] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1297.741193] ? get_pid_task+0xf4/0x190 [ 1297.745168] ? mark_held_locks+0xf0/0xf0 [ 1297.749241] ? proc_fail_nth_write+0x95/0x1d0 [ 1297.753740] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1297.758688] ? ksys_write+0x241/0x2a0 [ 1297.762502] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1297.768502] do_vfs_ioctl+0xcdb/0x12e0 [ 1297.772407] ? lock_downgrade+0x720/0x720 [ 1297.776747] ? check_preemption_disabled+0x41/0x280 [ 1297.781770] ? ioctl_preallocate+0x200/0x200 [ 1297.786188] ? __fget+0x356/0x510 [ 1297.789655] ? do_dup2+0x450/0x450 [ 1297.793201] ? vfs_write+0x393/0x540 [ 1297.796921] ? fput+0x2b/0x190 [ 1297.800128] ksys_ioctl+0x9b/0xc0 [ 1297.803587] __x64_sys_ioctl+0x6f/0xb0 [ 1297.807478] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1297.812065] do_syscall_64+0xf9/0x620 [ 1297.815877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.821151] RIP: 0033:0x4665f9 [ 1297.824342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.843244] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1297.850956] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1297.858232] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1297.865502] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1297.872771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.880037] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000240)}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:35 executing program 3 (fault-call:9 fault-nth:30): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:50:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009a03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x72dfecdf, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1300.202670] ISOFS: unable to read i-node block [ 1300.213972] FAULT_INJECTION: forcing a failure. [ 1300.213972] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.229668] isofs_fill_super: get root inode failed 09:50:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1300.288827] CPU: 1 PID: 30568 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1300.296743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.306102] Call Trace: [ 1300.308706] dump_stack+0x1fc/0x2ef [ 1300.312347] should_fail.cold+0xa/0xf [ 1300.316159] ? setup_fault_attr+0x200/0x200 [ 1300.320486] ? lock_acquire+0x170/0x3c0 [ 1300.324470] __should_failslab+0x115/0x180 [ 1300.328797] should_failslab+0x5/0x10 [ 1300.332601] kmem_cache_alloc+0x277/0x370 [ 1300.336757] mmu_topup_memory_caches+0x8f/0x370 [ 1300.341553] kvm_mmu_load+0x1e/0x1200 [ 1300.345357] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1300.350302] ? construct_eptp+0x3b0/0x3b0 [ 1300.354455] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1300.359341] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1300.364333] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1300.369181] ? get_task_pid+0x143/0x2a0 [ 1300.373165] ? lock_downgrade+0x720/0x720 [ 1300.377316] ? check_preemption_disabled+0x41/0x280 [ 1300.382341] ? check_preemption_disabled+0x41/0x280 [ 1300.387382] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1300.391532] kvm_vcpu_ioctl+0x493/0xe10 [ 1300.395514] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1300.401407] ? get_pid_task+0xf4/0x190 [ 1300.405298] ? mark_held_locks+0xf0/0xf0 [ 1300.409356] ? proc_fail_nth_write+0x95/0x1d0 [ 1300.413865] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1300.418824] ? ksys_write+0x241/0x2a0 [ 1300.422633] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1300.428607] do_vfs_ioctl+0xcdb/0x12e0 [ 1300.432507] ? lock_downgrade+0x720/0x720 [ 1300.436659] ? check_preemption_disabled+0x41/0x280 [ 1300.441675] ? ioctl_preallocate+0x200/0x200 [ 1300.446088] ? __fget+0x356/0x510 [ 1300.449546] ? do_dup2+0x450/0x450 [ 1300.453085] ? vfs_write+0x393/0x540 [ 1300.456798] ? fput+0x2b/0x190 [ 1300.459997] ksys_ioctl+0x9b/0xc0 [ 1300.463458] __x64_sys_ioctl+0x6f/0xb0 [ 1300.467350] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1300.471937] do_syscall_64+0xf9/0x620 [ 1300.475747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.480936] RIP: 0033:0x4665f9 [ 1300.484202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.503120] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1300.510830] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1300.518104] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1300.525377] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1300.532649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1300.539908] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:36 executing program 3 (fault-call:9 fault-nth:31): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009b03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1300.737297] FAULT_INJECTION: forcing a failure. [ 1300.737297] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.752732] CPU: 1 PID: 30590 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1300.760626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.769982] Call Trace: [ 1300.772583] dump_stack+0x1fc/0x2ef [ 1300.776221] should_fail.cold+0xa/0xf [ 1300.780024] ? setup_fault_attr+0x200/0x200 [ 1300.784357] ? lock_acquire+0x170/0x3c0 [ 1300.788342] __should_failslab+0x115/0x180 [ 1300.792580] should_failslab+0x5/0x10 [ 1300.796380] kmem_cache_alloc+0x277/0x370 [ 1300.800533] mmu_topup_memory_caches+0x8f/0x370 [ 1300.805218] kvm_mmu_load+0x1e/0x1200 [ 1300.809016] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1300.813946] ? construct_eptp+0x3b0/0x3b0 [ 1300.818096] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1300.822952] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1300.827900] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1300.832744] ? get_task_pid+0x143/0x2a0 [ 1300.836724] ? lock_downgrade+0x720/0x720 [ 1300.840876] ? check_preemption_disabled+0x41/0x280 [ 1300.845929] ? check_preemption_disabled+0x41/0x280 [ 1300.850960] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1300.855117] kvm_vcpu_ioctl+0x493/0xe10 [ 1300.859102] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1300.864996] ? lock_downgrade+0x720/0x720 [ 1300.869153] ? lock_acquire+0x170/0x3c0 [ 1300.873129] ? finish_task_switch+0x118/0x760 [ 1300.877630] ? _raw_spin_unlock_irq+0x24/0x80 [ 1300.882142] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1300.886749] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1300.891250] ? finish_task_switch+0x146/0x760 [ 1300.895751] ? finish_task_switch+0x118/0x760 [ 1300.900250] ? switch_mm_irqs_off+0x764/0x1340 [ 1300.904844] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1300.910736] do_vfs_ioctl+0xcdb/0x12e0 [ 1300.914632] ? io_schedule_timeout+0x140/0x140 [ 1300.919228] ? ioctl_preallocate+0x200/0x200 [ 1300.923642] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1300.928230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1300.932995] ? retint_kernel+0x2d/0x2d [ 1300.936900] ksys_ioctl+0x9b/0xc0 [ 1300.940360] __x64_sys_ioctl+0x6f/0xb0 [ 1300.944396] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1300.948984] do_syscall_64+0xf9/0x620 [ 1300.952795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.957987] RIP: 0033:0x4665f9 [ 1300.961196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1300.980136] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1300.987854] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1300.995124] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1301.002391] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1301.009663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1301.016932] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 09:50:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1301.376719] ieee802154 phy0 wpan0: encryption failed: -22 [ 1301.382326] ieee802154 phy1 wpan1: encryption failed: -22 09:50:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:38 executing program 3 (fault-call:9 fault-nth:32): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffffc, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009c03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1303.203174] FAULT_INJECTION: forcing a failure. [ 1303.203174] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.256744] ISOFS: unable to read i-node block [ 1303.263139] CPU: 1 PID: 30633 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1303.271037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.277785] isofs_fill_super: get root inode failed [ 1303.280386] Call Trace: [ 1303.280409] dump_stack+0x1fc/0x2ef [ 1303.280432] should_fail.cold+0xa/0xf [ 1303.280450] ? setup_fault_attr+0x200/0x200 [ 1303.280464] ? lock_acquire+0x170/0x3c0 [ 1303.280483] __should_failslab+0x115/0x180 [ 1303.307944] should_failslab+0x5/0x10 [ 1303.311792] kmem_cache_alloc+0x277/0x370 [ 1303.315960] mmu_topup_memory_caches+0x8f/0x370 [ 1303.320640] kvm_mmu_load+0x1e/0x1200 [ 1303.324443] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1303.329380] ? construct_eptp+0x3b0/0x3b0 [ 1303.333527] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1303.338376] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1303.343325] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1303.348169] ? get_task_pid+0x143/0x2a0 [ 1303.352157] ? lock_downgrade+0x720/0x720 [ 1303.356313] ? check_preemption_disabled+0x41/0x280 [ 1303.361342] ? check_preemption_disabled+0x41/0x280 [ 1303.366371] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1303.370520] kvm_vcpu_ioctl+0x493/0xe10 [ 1303.374507] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1303.380405] ? get_pid_task+0xf4/0x190 [ 1303.384299] ? mark_held_locks+0xf0/0xf0 [ 1303.388365] ? proc_fail_nth_write+0x95/0x1d0 [ 1303.392862] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1303.397803] ? ksys_write+0x241/0x2a0 [ 1303.401701] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1303.407585] do_vfs_ioctl+0xcdb/0x12e0 [ 1303.411482] ? lock_downgrade+0x720/0x720 [ 1303.415636] ? check_preemption_disabled+0x41/0x280 [ 1303.420688] ? ioctl_preallocate+0x200/0x200 [ 1303.425100] ? __fget+0x356/0x510 [ 1303.428560] ? do_dup2+0x450/0x450 [ 1303.432098] ? vfs_write+0x393/0x540 [ 1303.435814] ? fput+0x2b/0x190 [ 1303.439018] ksys_ioctl+0x9b/0xc0 [ 1303.442475] __x64_sys_ioctl+0x6f/0xb0 [ 1303.446370] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1303.450961] do_syscall_64+0xf9/0x620 [ 1303.454770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.459963] RIP: 0033:0x4665f9 [ 1303.463168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.482068] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1303.489807] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1303.497075] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 09:50:39 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1303.504343] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.511635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1303.518905] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 [ 1303.539406] FAULT_INJECTION: forcing a failure. [ 1303.539406] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.551575] CPU: 1 PID: 30658 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1303.559510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.568862] Call Trace: [ 1303.571460] dump_stack+0x1fc/0x2ef [ 1303.575100] should_fail.cold+0xa/0xf [ 1303.578914] ? setup_fault_attr+0x200/0x200 [ 1303.583248] ? lock_acquire+0x170/0x3c0 [ 1303.587235] __should_failslab+0x115/0x180 [ 1303.591478] should_failslab+0x5/0x10 [ 1303.595282] __kmalloc+0x2ab/0x3c0 [ 1303.598820] ? __se_sys_memfd_create+0xf8/0x440 [ 1303.603490] __se_sys_memfd_create+0xf8/0x440 [ 1303.608012] ? memfd_file_seals_ptr+0x150/0x150 [ 1303.612692] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1303.618058] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1303.623077] ? do_syscall_64+0x21/0x620 [ 1303.627055] do_syscall_64+0xf9/0x620 [ 1303.630869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.636058] RIP: 0033:0x4665f9 [ 1303.639251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.658150] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1303.665860] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 1303.673134] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1303.680404] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 1303.687670] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1303.694943] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200006c0 09:50:39 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020009d03200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:39 executing program 3 (fault-call:9 fault-nth:33): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1303.814190] FAULT_INJECTION: forcing a failure. [ 1303.814190] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.825877] CPU: 1 PID: 30668 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1303.833781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.843143] Call Trace: [ 1303.845740] dump_stack+0x1fc/0x2ef [ 1303.849375] should_fail.cold+0xa/0xf [ 1303.853180] ? setup_fault_attr+0x200/0x200 [ 1303.857504] ? lock_acquire+0x170/0x3c0 [ 1303.861573] __should_failslab+0x115/0x180 [ 1303.865818] should_failslab+0x5/0x10 [ 1303.869619] kmem_cache_alloc+0x277/0x370 [ 1303.873770] ? shmem_destroy_callback+0xb0/0xb0 [ 1303.878439] shmem_alloc_inode+0x18/0x40 [ 1303.882500] ? shmem_destroy_callback+0xb0/0xb0 [ 1303.887173] alloc_inode+0x5d/0x180 [ 1303.890799] new_inode+0x1d/0xf0 [ 1303.894167] shmem_get_inode+0x96/0x8d0 [ 1303.898147] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1303.903081] shmem_file_setup+0x61/0x90 [ 1303.907056] __se_sys_memfd_create+0x26b/0x440 [ 1303.911638] ? memfd_file_seals_ptr+0x150/0x150 [ 1303.916306] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1303.921844] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1303.926860] ? do_syscall_64+0x21/0x620 [ 1303.930835] do_syscall_64+0xf9/0x620 [ 1303.934660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.939854] RIP: 0033:0x4665f9 [ 1303.943047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.961960] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1303.969762] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 1303.977036] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1303.984389] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 1303.991659] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1303.998930] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200006c0 09:50:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000007000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1304.079425] ISOFS: unable to read i-node block [ 1304.097742] isofs_fill_super: get root inode failed 09:50:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:40 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1304.169511] FAULT_INJECTION: forcing a failure. [ 1304.169511] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.182907] CPU: 1 PID: 30681 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 1304.190809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.200170] Call Trace: [ 1304.202767] dump_stack+0x1fc/0x2ef [ 1304.206661] should_fail.cold+0xa/0xf [ 1304.210481] ? setup_fault_attr+0x200/0x200 [ 1304.214811] ? lock_acquire+0x170/0x3c0 [ 1304.219228] __should_failslab+0x115/0x180 [ 1304.223472] should_failslab+0x5/0x10 [ 1304.227286] kmem_cache_alloc+0x277/0x370 [ 1304.231447] mmu_topup_memory_caches+0x8f/0x370 [ 1304.236126] kvm_mmu_load+0x1e/0x1200 [ 1304.239936] ? kvm_lapic_enable_pv_eoi+0x160/0x160 [ 1304.244867] ? construct_eptp+0x3b0/0x3b0 [ 1304.249016] ? vmx_get_nmi_mask.part.0+0xee/0x130 [ 1304.253876] kvm_arch_vcpu_ioctl_run+0x4e28/0x6f60 [ 1304.258823] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 1304.263673] ? get_task_pid+0x143/0x2a0 [ 1304.266490] FAULT_INJECTION: forcing a failure. [ 1304.266490] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.267652] ? lock_downgrade+0x720/0x720 [ 1304.267671] ? check_preemption_disabled+0x41/0x280 [ 1304.267685] ? check_preemption_disabled+0x41/0x280 [ 1304.267708] ? kvm_vcpu_ioctl+0x493/0xe10 [ 1304.297227] kvm_vcpu_ioctl+0x493/0xe10 [ 1304.301211] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1304.307107] ? get_pid_task+0xf4/0x190 [ 1304.311024] ? mark_held_locks+0xf0/0xf0 [ 1304.315109] ? proc_fail_nth_write+0x95/0x1d0 [ 1304.319610] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1304.324554] ? ksys_write+0x241/0x2a0 [ 1304.328360] ? kvm_vm_ioctl_check_extension_generic+0xb0/0xb0 [ 1304.334256] do_vfs_ioctl+0xcdb/0x12e0 [ 1304.338150] ? lock_downgrade+0x720/0x720 [ 1304.342304] ? check_preemption_disabled+0x41/0x280 [ 1304.347328] ? ioctl_preallocate+0x200/0x200 [ 1304.351752] ? __fget+0x356/0x510 [ 1304.355212] ? do_dup2+0x450/0x450 [ 1304.358752] ? vfs_write+0x393/0x540 [ 1304.362459] ? fput+0x2b/0x190 [ 1304.365656] ksys_ioctl+0x9b/0xc0 [ 1304.369098] __x64_sys_ioctl+0x6f/0xb0 [ 1304.372979] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1304.377552] do_syscall_64+0xf9/0x620 [ 1304.381344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.386607] RIP: 0033:0x4665f9 [ 1304.389834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.408726] RSP: 002b:00007f4e34acb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:50:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000050020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1304.416423] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1304.423677] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1304.431536] RBP: 00007f4e34acb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.438789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.446044] R13: 00007ffe5f6a118f R14: 00007f4e34acb300 R15: 0000000000022000 [ 1304.472705] CPU: 1 PID: 30692 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1304.480607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.489975] Call Trace: [ 1304.492569] dump_stack+0x1fc/0x2ef [ 1304.496207] should_fail.cold+0xa/0xf [ 1304.500019] ? setup_fault_attr+0x200/0x200 [ 1304.504384] ? lock_acquire+0x170/0x3c0 [ 1304.508379] __should_failslab+0x115/0x180 [ 1304.512624] should_failslab+0x5/0x10 [ 1304.516434] kmem_cache_alloc+0x277/0x370 [ 1304.520590] __d_alloc+0x2b/0xa10 [ 1304.524227] d_alloc_pseudo+0x19/0x70 [ 1304.528035] alloc_file_pseudo+0xc6/0x250 [ 1304.532228] ? alloc_file+0x4d0/0x4d0 [ 1304.536040] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1304.541674] ? shmem_get_inode+0x44c/0x8d0 [ 1304.545914] __shmem_file_setup.part.0+0x102/0x2b0 [ 1304.550858] shmem_file_setup+0x61/0x90 [ 1304.554820] __se_sys_memfd_create+0x26b/0x440 [ 1304.559390] ? memfd_file_seals_ptr+0x150/0x150 [ 1304.564048] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1304.569420] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1304.574422] ? do_syscall_64+0x21/0x620 [ 1304.578391] do_syscall_64+0xf9/0x620 [ 1304.582183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.587362] RIP: 0033:0x4665f9 [ 1304.590556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.609440] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:50:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1304.617231] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 1304.624497] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1304.631764] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 1304.639016] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1304.646359] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200006c0 09:50:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1304.757562] ISOFS: unable to read i-node block [ 1304.766927] isofs_fill_super: get root inode failed 09:50:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:42 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:42 executing program 3 (fault-call:9 fault-nth:34): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020000a0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888096f738f8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1306.757181] FAULT_INJECTION: forcing a failure. [ 1306.757181] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.783378] ISOFS: unable to read i-node block [ 1306.804830] isofs_fill_super: get root inode failed [ 1306.812853] CPU: 0 PID: 30729 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1306.820763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.830112] Call Trace: [ 1306.832694] dump_stack+0x1fc/0x2ef [ 1306.836312] should_fail.cold+0xa/0xf [ 1306.840106] ? setup_fault_attr+0x200/0x200 [ 1306.844447] ? lock_acquire+0x170/0x3c0 [ 1306.848413] __should_failslab+0x115/0x180 [ 1306.852642] should_failslab+0x5/0x10 [ 1306.856429] kmem_cache_alloc+0x277/0x370 [ 1306.860566] __alloc_file+0x21/0x330 [ 1306.864286] alloc_empty_file+0x6d/0x170 [ 1306.868340] alloc_file+0x5e/0x4d0 [ 1306.871872] alloc_file_pseudo+0x165/0x250 [ 1306.876105] ? alloc_file+0x4d0/0x4d0 [ 1306.879894] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1306.885505] ? shmem_get_inode+0x44c/0x8d0 [ 1306.889731] __shmem_file_setup.part.0+0x102/0x2b0 [ 1306.894653] shmem_file_setup+0x61/0x90 [ 1306.898706] __se_sys_memfd_create+0x26b/0x440 [ 1306.903281] ? memfd_file_seals_ptr+0x150/0x150 [ 1306.907943] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1306.913300] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1306.918328] ? do_syscall_64+0x21/0x620 [ 1306.922299] do_syscall_64+0xf9/0x620 [ 1306.926107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.931285] RIP: 0033:0x4665f9 [ 1306.934483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1306.953373] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1306.961072] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 1306.968328] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1306.975583] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 1306.982838] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1306.990095] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200006c0 09:50:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002002200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:43 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1307.167076] ISOFS: unable to read i-node block [ 1307.199438] isofs_fill_super: get root inode failed [ 1307.211227] FAULT_INJECTION: forcing a failure. [ 1307.211227] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.233050] CPU: 1 PID: 30763 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1307.240960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.250582] Call Trace: [ 1307.253535] dump_stack+0x1fc/0x2ef [ 1307.257184] should_fail.cold+0xa/0xf [ 1307.260993] ? setup_fault_attr+0x200/0x200 [ 1307.265328] ? lock_acquire+0x170/0x3c0 [ 1307.269330] __should_failslab+0x115/0x180 [ 1307.273583] should_failslab+0x5/0x10 [ 1307.277393] kmem_cache_alloc_trace+0x284/0x380 [ 1307.282170] apparmor_file_alloc_security+0x394/0xad0 [ 1307.287811] ? apparmor_file_receive+0x160/0x160 [ 1307.292579] ? __alloc_file+0x21/0x330 [ 1307.296503] security_file_alloc+0x40/0x90 [ 1307.300763] __alloc_file+0xc9/0x330 [ 1307.304485] alloc_empty_file+0x6d/0x170 [ 1307.308557] alloc_file+0x5e/0x4d0 [ 1307.312104] alloc_file_pseudo+0x165/0x250 [ 1307.316348] ? alloc_file+0x4d0/0x4d0 [ 1307.320156] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1307.325787] ? shmem_get_inode+0x44c/0x8d0 [ 1307.330035] __shmem_file_setup.part.0+0x102/0x2b0 [ 1307.334976] shmem_file_setup+0x61/0x90 [ 1307.338957] __se_sys_memfd_create+0x26b/0x440 [ 1307.343544] ? memfd_file_seals_ptr+0x150/0x150 [ 1307.348221] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1307.353591] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1307.358615] ? do_syscall_64+0x21/0x620 [ 1307.362596] do_syscall_64+0xf9/0x620 [ 1307.366405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.371594] RIP: 0033:0x4665f9 [ 1307.374790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.393954] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1307.401676] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 1307.408943] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 1307.416213] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 1307.423493] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 1307.430763] R13: 0000000020000100 R14: 0000000000020000 R15: 00000000200006c0 09:50:43 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1307.558258] FAULT_INJECTION: forcing a failure. [ 1307.558258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1307.585123] CPU: 1 PID: 30778 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1307.593035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.602390] Call Trace: [ 1307.604989] dump_stack+0x1fc/0x2ef [ 1307.608628] should_fail.cold+0xa/0xf [ 1307.612438] ? lock_acquire+0x170/0x3c0 [ 1307.616425] ? setup_fault_attr+0x200/0x200 [ 1307.620773] __alloc_pages_nodemask+0x239/0x2890 [ 1307.625722] ? __lock_acquire+0x6de/0x3ff0 [ 1307.629980] ? mark_held_locks+0xf0/0xf0 [ 1307.634049] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1307.638905] ? __lock_acquire+0x6de/0x3ff0 [ 1307.643158] ? finish_task_switch+0x146/0x760 [ 1307.647699] ? mark_held_locks+0xf0/0xf0 [ 1307.651768] alloc_pages_vma+0xf2/0x780 [ 1307.655759] shmem_alloc_page+0x11c/0x1f0 [ 1307.659918] ? shmem_swapin+0x220/0x220 [ 1307.663920] ? percpu_counter_add_batch+0x126/0x180 [ 1307.668944] ? __vm_enough_memory+0x316/0x650 [ 1307.673454] shmem_alloc_and_acct_page+0x15a/0x850 [ 1307.678394] shmem_getpage_gfp+0x4e9/0x37f0 [ 1307.682733] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1307.687848] ? mark_held_locks+0xa6/0xf0 [ 1307.691928] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1307.697127] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1307.702326] shmem_write_begin+0xff/0x1e0 [ 1307.706489] generic_perform_write+0x1f8/0x4d0 [ 1307.711084] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1307.715754] ? current_time+0x1c0/0x1c0 [ 1307.719737] ? lock_acquire+0x170/0x3c0 [ 1307.723748] __generic_file_write_iter+0x24b/0x610 [ 1307.728947] generic_file_write_iter+0x3f8/0x730 [ 1307.733765] __vfs_write+0x51b/0x770 [ 1307.737495] ? kernel_read+0x110/0x110 [ 1307.741406] ? check_preemption_disabled+0x41/0x280 [ 1307.746461] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1307.751485] vfs_write+0x1f3/0x540 [ 1307.755035] __x64_sys_pwrite64+0x1f7/0x250 [ 1307.759454] ? ksys_pwrite64+0x1a0/0x1a0 [ 1307.763535] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1307.768590] ? do_syscall_64+0x21/0x620 [ 1307.772576] do_syscall_64+0xf9/0x620 [ 1307.776389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.781581] RIP: 0033:0x419797 [ 1307.784865] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1307.803766] RSP: 002b:00007f4b7890ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1307.811477] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1307.818745] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 1307.826018] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 1307.833285] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1307.840555] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 09:50:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1e, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:45 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:50:45 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888098c92c78, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1309.849578] FAULT_INJECTION: forcing a failure. [ 1309.849578] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.860895] CPU: 0 PID: 30800 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1309.868830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.878191] Call Trace: [ 1309.880789] dump_stack+0x1fc/0x2ef [ 1309.884427] should_fail.cold+0xa/0xf [ 1309.888237] ? setup_fault_attr+0x200/0x200 [ 1309.892576] ? __lock_acquire+0x6de/0x3ff0 [ 1309.896824] __should_failslab+0x115/0x180 [ 1309.901075] should_failslab+0x5/0x10 [ 1309.904882] kmem_cache_alloc+0x3f/0x370 [ 1309.908955] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1309.914583] __radix_tree_create+0x314/0x540 [ 1309.918989] __radix_tree_insert+0xbb/0x5f0 [ 1309.923489] ? __radix_tree_create+0x540/0x540 [ 1309.928073] ? lock_acquire+0x170/0x3c0 [ 1309.932045] ? shmem_add_to_page_cache+0x306/0xbb0 [ 1309.936973] shmem_add_to_page_cache+0x616/0xbb0 [ 1309.941722] ? shmem_recalc_inode+0x310/0x310 [ 1309.946205] ? __radix_tree_preload+0x1fe/0x280 [ 1309.950878] shmem_getpage_gfp+0x2004/0x37f0 [ 1309.955289] ? shmem_alloc_and_acct_page+0x850/0x850 [ 1309.960381] ? mark_held_locks+0xa6/0xf0 [ 1309.964437] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1309.969631] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1309.974815] shmem_write_begin+0xff/0x1e0 [ 1309.978998] generic_perform_write+0x1f8/0x4d0 [ 1309.983579] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1309.988679] ? current_time+0x1c0/0x1c0 [ 1309.992664] ? lock_acquire+0x170/0x3c0 [ 1309.996635] __generic_file_write_iter+0x24b/0x610 [ 1310.001566] generic_file_write_iter+0x3f8/0x730 [ 1310.006318] __vfs_write+0x51b/0x770 [ 1310.010024] ? kernel_read+0x110/0x110 [ 1310.013911] ? check_preemption_disabled+0x41/0x280 [ 1310.018924] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1310.023944] vfs_write+0x1f3/0x540 [ 1310.027478] __x64_sys_pwrite64+0x1f7/0x250 [ 1310.031810] ? ksys_pwrite64+0x1a0/0x1a0 [ 1310.035873] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1310.040894] ? do_syscall_64+0x21/0x620 [ 1310.044973] do_syscall_64+0xf9/0x620 [ 1310.048774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.053959] RIP: 0033:0x419797 [ 1310.057142] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1310.076120] RSP: 002b:00007f4b7890ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1310.083824] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 1310.091441] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 09:50:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1310.098700] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 1310.105960] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1310.113393] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1310.150187] audit: type=1804 audit(1630144246.000:281): pid=30797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir791007418/syzkaller.nUaJWB/2057/cgroup.controllers" dev="sda1" ino=15314 res=1 09:50:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x2000, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1310.218837] ISOFS: unable to read i-node block [ 1310.224594] isofs_fill_super: get root inode failed [ 1310.232387] audit: type=1804 audit(1630144246.030:282): pid=30806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir791007418/syzkaller.nUaJWB/2057/cgroup.controllers" dev="sda1" ino=15314 res=1 09:50:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002004200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:46 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1310.531212] FAULT_INJECTION: forcing a failure. [ 1310.531212] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.551000] ISOFS: unable to read i-node block [ 1310.560435] isofs_fill_super: get root inode failed [ 1310.566227] CPU: 0 PID: 30848 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1310.574137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.583512] Call Trace: [ 1310.586113] dump_stack+0x1fc/0x2ef [ 1310.589749] should_fail.cold+0xa/0xf [ 1310.593554] ? setup_fault_attr+0x200/0x200 [ 1310.597880] ? lock_acquire+0x170/0x3c0 [ 1310.601860] __should_failslab+0x115/0x180 [ 1310.606100] should_failslab+0x5/0x10 [ 1310.609904] kmem_cache_alloc+0x277/0x370 [ 1310.614057] getname_flags+0xce/0x590 [ 1310.617865] do_sys_open+0x26c/0x520 [ 1310.621673] ? filp_open+0x70/0x70 [ 1310.625309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1310.630676] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1310.635694] ? do_syscall_64+0x21/0x620 [ 1310.639673] do_syscall_64+0xf9/0x620 [ 1310.643521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.648797] RIP: 0033:0x4196e4 [ 1310.651991] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1310.670976] RSP: 002b:00007f4b7890fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1310.678688] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1310.685963] RDX: 0000000000000002 RSI: 00007f4b78910000 RDI: 00000000ffffff9c [ 1310.693231] RBP: 00007f4b78910000 R08: 0000000000000000 R09: ffffffffffffffff [ 1310.700495] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1310.707767] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1e, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000012000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x7f, 0x9, 0x7, 0x2, 0xff, 0x7, 0x10001, 0xa48000000000000, 0x6886, 0x4, 0x7fffffff, 0x4, 0x9, 0x80000000, 0x2, 0x7f], 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:48 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002005200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88809e506b98, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1312.890307] FAULT_INJECTION: forcing a failure. [ 1312.890307] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.931479] ISOFS: unable to read i-node block [ 1312.948760] isofs_fill_super: get root inode failed [ 1312.968259] CPU: 0 PID: 30883 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1312.976175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.986057] Call Trace: [ 1312.988656] dump_stack+0x1fc/0x2ef [ 1312.992302] should_fail.cold+0xa/0xf [ 1312.996197] ? setup_fault_attr+0x200/0x200 [ 1313.000519] ? lock_acquire+0x170/0x3c0 [ 1313.004514] __should_failslab+0x115/0x180 [ 1313.008754] should_failslab+0x5/0x10 [ 1313.012571] kmem_cache_alloc+0x277/0x370 [ 1313.016727] __alloc_file+0x21/0x330 [ 1313.020446] alloc_empty_file+0x6d/0x170 [ 1313.024515] path_openat+0xe9/0x2df0 [ 1313.028277] ? __lock_acquire+0x6de/0x3ff0 [ 1313.032527] ? path_lookupat+0x8d0/0x8d0 [ 1313.036590] ? mark_held_locks+0xf0/0xf0 [ 1313.040652] ? mark_held_locks+0xf0/0xf0 [ 1313.044722] do_filp_open+0x18c/0x3f0 [ 1313.048525] ? may_open_dev+0xf0/0xf0 [ 1313.052328] ? __alloc_fd+0x28d/0x570 [ 1313.056137] ? lock_downgrade+0x720/0x720 [ 1313.060286] ? lock_acquire+0x170/0x3c0 [ 1313.064259] ? __alloc_fd+0x34/0x570 [ 1313.067977] ? do_raw_spin_unlock+0x171/0x230 [ 1313.072476] ? _raw_spin_unlock+0x29/0x40 [ 1313.076630] ? __alloc_fd+0x28d/0x570 [ 1313.080439] do_sys_open+0x3b3/0x520 [ 1313.084152] ? filp_open+0x70/0x70 [ 1313.087788] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1313.093161] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1313.098190] ? do_syscall_64+0x21/0x620 [ 1313.102283] do_syscall_64+0xf9/0x620 [ 1313.106109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.111311] RIP: 0033:0x4196e4 09:50:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x1ff, 0x0, 0x5000, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1313.114517] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1313.133507] RSP: 002b:00007f4b7890fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1313.141218] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1313.148487] RDX: 0000000000000002 RSI: 00007f4b78910000 RDI: 00000000ffffff9c [ 1313.155841] RBP: 00007f4b78910000 R08: 0000000000000000 R09: ffffffffffffffff [ 1313.163111] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1313.170385] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002006200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x10, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000140)={0x300000, 0x3f, 0x5, 0x6, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0397, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x10002, 0x4, 0x0, 0x1000, &(0x7f000000c000/0x1000)=nil}) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:50:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1313.415101] ISOFS: unable to read i-node block [ 1313.433285] isofs_fill_super: get root inode failed 09:50:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1e, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:51 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002007200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000140)={0x1, 0x104000}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000100), 0x6, 0x8000) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x8, 0x3, 0x80000001, 0x9, 0x3d7, 0x6}, {0xb44, 0x7, 0x6, 0x5, 0x6, 0x768}], ['\x00', '\x00', '\x00', '\x00']}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880a51061f8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1315.939486] FAULT_INJECTION: forcing a failure. [ 1315.939486] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.974311] CPU: 1 PID: 30958 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1315.982229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.991589] Call Trace: [ 1315.994187] dump_stack+0x1fc/0x2ef [ 1315.997836] should_fail.cold+0xa/0xf [ 1316.001653] ? setup_fault_attr+0x200/0x200 [ 1316.006420] ? lock_acquire+0x170/0x3c0 [ 1316.010414] __should_failslab+0x115/0x180 [ 1316.014655] should_failslab+0x5/0x10 [ 1316.018458] kmem_cache_alloc+0x277/0x370 [ 1316.022612] __alloc_file+0x21/0x330 [ 1316.026343] alloc_empty_file+0x6d/0x170 [ 1316.030413] path_openat+0xe9/0x2df0 [ 1316.034132] ? __lock_acquire+0x6de/0x3ff0 [ 1316.038564] ? path_lookupat+0x8d0/0x8d0 [ 1316.042633] ? mark_held_locks+0xf0/0xf0 [ 1316.046710] do_filp_open+0x18c/0x3f0 [ 1316.050512] ? may_open_dev+0xf0/0xf0 [ 1316.054318] ? __alloc_fd+0x28d/0x570 [ 1316.058352] ? lock_downgrade+0x720/0x720 [ 1316.062502] ? lock_acquire+0x170/0x3c0 [ 1316.066479] ? __alloc_fd+0x34/0x570 [ 1316.070199] ? do_raw_spin_unlock+0x171/0x230 [ 1316.074702] ? _raw_spin_unlock+0x29/0x40 [ 1316.078861] ? __alloc_fd+0x28d/0x570 [ 1316.082672] do_sys_open+0x3b3/0x520 [ 1316.086391] ? filp_open+0x70/0x70 [ 1316.089938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1316.095301] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1316.100407] ? do_syscall_64+0x21/0x620 [ 1316.104387] do_syscall_64+0xf9/0x620 [ 1316.108198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.113396] RIP: 0033:0x4196e4 [ 1316.116591] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 09:50:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000037dc125020000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1316.135522] RSP: 002b:00007f4b7890fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1316.143232] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 1316.150503] RDX: 0000000000000002 RSI: 00007f4b78910000 RDI: 00000000ffffff9c [ 1316.157772] RBP: 00007f4b78910000 R08: 0000000000000000 R09: ffffffffffffffff [ 1316.165052] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1316.172335] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1316.205734] ISOFS: unable to read i-node block [ 1316.210770] isofs_fill_super: get root inode failed 09:50:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x23, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002008200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000000040)={0x50, 0x0, r4, {0x7, 0x1f, 0x0, 0x120a002}}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0xfffffffffffffffe, r4}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x5000, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x4400) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f00000001c0)={[{0x1, 0x2, 0xc0, 0x1, 0xea, 0x9, 0x6f, 0x19, 0x3, 0x8, 0x13, 0x2, 0x4}, {0x9, 0x3, 0x8, 0x0, 0x80, 0x52, 0x0, 0x1, 0x6, 0x7, 0x3f, 0x20, 0xdea9}, {0x1ff, 0x2, 0x0, 0x3, 0x89, 0x2, 0x3f, 0x6, 0x3f, 0x1f, 0x0, 0x8, 0x1f8}], 0x6}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x408183, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000001000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1316.406163] ISOFS: unable to read i-node block [ 1316.425698] isofs_fill_super: get root inode failed 09:50:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002009200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:52 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x10004, 0x2, 0x2, 0x1000, &(0x7f000000a000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1316.652284] FAULT_INJECTION: forcing a failure. [ 1316.652284] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.676452] CPU: 1 PID: 31020 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1316.684370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.693728] Call Trace: [ 1316.696327] dump_stack+0x1fc/0x2ef [ 1316.699964] should_fail.cold+0xa/0xf [ 1316.703774] ? setup_fault_attr+0x200/0x200 [ 1316.708102] ? lock_acquire+0x170/0x3c0 [ 1316.712090] __should_failslab+0x115/0x180 [ 1316.716333] should_failslab+0x5/0x10 [ 1316.720135] kmem_cache_alloc_trace+0x284/0x380 [ 1316.724809] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1316.729565] __kthread_create_on_node+0xd2/0x410 [ 1316.734323] ? kthread_parkme+0xa0/0xa0 [ 1316.738297] ? lo_ioctl+0x1bb/0x20e0 [ 1316.742019] ? __mutex_lock+0x365/0x1200 [ 1316.746087] ? lock_downgrade+0x720/0x720 [ 1316.750250] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1316.755011] kthread_create_on_node+0xbb/0xf0 [ 1316.759512] ? __kthread_create_on_node+0x410/0x410 [ 1316.764527] ? __fget+0x356/0x510 [ 1316.767988] ? do_dup2+0x450/0x450 [ 1316.771539] ? __lockdep_init_map+0x100/0x5a0 [ 1316.776070] ? __lockdep_init_map+0x100/0x5a0 [ 1316.780577] lo_ioctl+0xae5/0x20e0 [ 1316.784123] ? loop_set_status64+0x110/0x110 [ 1316.788537] blkdev_ioctl+0x5cb/0x1a80 [ 1316.792433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.797803] ? blkpg_ioctl+0x9d0/0x9d0 [ 1316.801729] ? mark_held_locks+0xf0/0xf0 [ 1316.805797] ? mark_held_locks+0xf0/0xf0 [ 1316.809872] ? debug_check_no_obj_freed+0x201/0x490 [ 1316.814898] ? lock_downgrade+0x720/0x720 [ 1316.819063] block_ioctl+0xe9/0x130 [ 1316.822694] ? blkdev_fallocate+0x3f0/0x3f0 [ 1316.827014] do_vfs_ioctl+0xcdb/0x12e0 [ 1316.830913] ? lock_downgrade+0x720/0x720 [ 1316.835089] ? check_preemption_disabled+0x41/0x280 [ 1316.840112] ? ioctl_preallocate+0x200/0x200 [ 1316.844528] ? __fget+0x356/0x510 [ 1316.847981] ? do_dup2+0x450/0x450 [ 1316.851533] ? do_sys_open+0x2bf/0x520 [ 1316.855436] ksys_ioctl+0x9b/0xc0 [ 1316.858894] __x64_sys_ioctl+0x6f/0xb0 [ 1316.862784] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1316.867380] do_syscall_64+0xf9/0x620 [ 1316.871195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.876386] RIP: 0033:0x4663b7 [ 1316.879590] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1316.898658] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1316.906369] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1316.913631] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1316.921066] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1316.928334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1316.935591] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880ab006c78, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:52 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x10003, 0x3, 0x4, 0x1000, &(0x7f0000011000/0x1000)=nil}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) tee(r1, 0xffffffffffffffff, 0x8000, 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1317.157807] FAULT_INJECTION: forcing a failure. [ 1317.157807] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.203537] CPU: 1 PID: 31050 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1317.211451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.220821] Call Trace: [ 1317.223420] dump_stack+0x1fc/0x2ef [ 1317.227064] should_fail.cold+0xa/0xf [ 1317.230872] ? setup_fault_attr+0x200/0x200 [ 1317.235195] ? lock_acquire+0x170/0x3c0 [ 1317.239179] __should_failslab+0x115/0x180 [ 1317.243422] should_failslab+0x5/0x10 [ 1317.247224] kmem_cache_alloc+0x277/0x370 [ 1317.251381] __kernfs_new_node+0xd2/0x680 [ 1317.255538] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1317.260295] ? __cpu_to_node+0x7b/0xa0 [ 1317.264184] ? account_entity_enqueue+0x2e5/0x440 [ 1317.269030] ? mark_held_locks+0xf0/0xf0 [ 1317.273093] ? enqueue_entity+0xf86/0x3850 [ 1317.277354] ? set_user_nice.part.0+0x3b9/0xab0 [ 1317.282032] kernfs_create_dir_ns+0x9e/0x230 [ 1317.286445] internal_create_group+0x1c1/0xb20 [ 1317.291037] ? sysfs_remove_link_from_group+0x70/0x70 [ 1317.296232] ? lock_downgrade+0x720/0x720 [ 1317.300396] lo_ioctl+0xf7c/0x20e0 [ 1317.303945] ? loop_set_status64+0x110/0x110 [ 1317.308358] blkdev_ioctl+0x5cb/0x1a80 [ 1317.312291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.317742] ? blkpg_ioctl+0x9d0/0x9d0 [ 1317.321632] ? mark_held_locks+0xf0/0xf0 [ 1317.325699] ? mark_held_locks+0xf0/0xf0 [ 1317.329851] ? debug_check_no_obj_freed+0x201/0x490 [ 1317.334869] ? lock_downgrade+0x720/0x720 [ 1317.339021] block_ioctl+0xe9/0x130 [ 1317.342653] ? blkdev_fallocate+0x3f0/0x3f0 [ 1317.347004] do_vfs_ioctl+0xcdb/0x12e0 [ 1317.350890] ? lock_downgrade+0x720/0x720 [ 1317.355037] ? check_preemption_disabled+0x41/0x280 [ 1317.360052] ? ioctl_preallocate+0x200/0x200 [ 1317.364471] ? __fget+0x356/0x510 [ 1317.367928] ? do_dup2+0x450/0x450 [ 1317.371471] ? do_sys_open+0x2bf/0x520 [ 1317.375375] ksys_ioctl+0x9b/0xc0 [ 1317.378836] __x64_sys_ioctl+0x6f/0xb0 [ 1317.382722] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1317.387308] do_syscall_64+0xf9/0x620 [ 1317.391113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.396300] RIP: 0033:0x4663b7 [ 1317.399491] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1317.418391] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1317.426273] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1317.433541] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1317.440806] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1317.448072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1317.455339] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x23, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e005500580020002000200020002000200020002000200c200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000100)="64660f38821066b830000f00d80f01bf020000000f01c4c4c1356a8a002000006675f80cb868e70a89ef66bafc0c66ed0f35eac66a7b928000b8000000000f23c80f21f8350800f0000f0199", 0x4c}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:55 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e40a8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1319.409051] FAULT_INJECTION: forcing a failure. [ 1319.409051] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.438369] CPU: 1 PID: 31077 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1319.446289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.455642] Call Trace: [ 1319.458228] dump_stack+0x1fc/0x2ef [ 1319.461846] should_fail.cold+0xa/0xf [ 1319.465643] ? setup_fault_attr+0x200/0x200 [ 1319.469966] ? lock_acquire+0x170/0x3c0 [ 1319.473933] __should_failslab+0x115/0x180 [ 1319.478159] should_failslab+0x5/0x10 [ 1319.481947] kmem_cache_alloc+0x277/0x370 [ 1319.486082] __kernfs_new_node+0xd2/0x680 [ 1319.490228] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1319.494977] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1319.499460] ? __cpu_to_node+0x7b/0xa0 [ 1319.503340] ? mark_held_locks+0xf0/0xf0 [ 1319.507390] ? io_schedule_timeout+0x140/0x140 [ 1319.511960] ? enqueue_entity+0xf86/0x3850 [ 1319.516186] ? set_user_nice.part.0+0x3b9/0xab0 [ 1319.520854] kernfs_create_dir_ns+0x9e/0x230 [ 1319.525253] internal_create_group+0x1c1/0xb20 [ 1319.529839] ? sysfs_remove_link_from_group+0x70/0x70 [ 1319.535031] ? lock_downgrade+0x720/0x720 [ 1319.539175] lo_ioctl+0xf7c/0x20e0 [ 1319.542720] ? loop_set_status64+0x110/0x110 [ 1319.547117] blkdev_ioctl+0x5cb/0x1a80 [ 1319.551037] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.556387] ? blkpg_ioctl+0x9d0/0x9d0 [ 1319.560263] ? mark_held_locks+0xf0/0xf0 [ 1319.564308] ? mark_held_locks+0xf0/0xf0 [ 1319.568364] ? debug_check_no_obj_freed+0x201/0x490 [ 1319.573372] ? lock_downgrade+0x720/0x720 [ 1319.577509] block_ioctl+0xe9/0x130 [ 1319.581122] ? blkdev_fallocate+0x3f0/0x3f0 [ 1319.585429] do_vfs_ioctl+0xcdb/0x12e0 [ 1319.589310] ? lock_downgrade+0x720/0x720 [ 1319.593445] ? check_preemption_disabled+0x41/0x280 [ 1319.598445] ? ioctl_preallocate+0x200/0x200 [ 1319.602840] ? __fget+0x356/0x510 [ 1319.606278] ? do_dup2+0x450/0x450 [ 1319.609803] ? do_sys_open+0x2bf/0x520 [ 1319.613690] ksys_ioctl+0x9b/0xc0 [ 1319.617133] __x64_sys_ioctl+0x6f/0xb0 [ 1319.621007] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1319.625580] do_syscall_64+0xf9/0x620 [ 1319.629379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.634574] RIP: 0033:0x4663b7 [ 1319.637755] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1319.656655] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1319.664351] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1319.671604] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1319.678857] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1319.686123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1319.693469] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:55 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000400)={[0x3ff, 0xffffffffffffffff, 0x400000009, 0xfffffffffffffe00, 0x0, 0x2800000000000, 0x4, 0x7, 0xffffffffffff0000, 0xc66, 0x10000, 0x1, 0x9, 0x5, 0x7, 0x1], 0xf000, 0x4d6c2}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000380)={0x10200, 0x0, 0x100000, 0x1000, &(0x7f0000001000/0x1000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000100)="0fc7360f009e00100000660f50f90fc79f5a0000000f01cab96e0900000f32b8010000000f01c10f01c3b981010000b870000000ba000000000f3066b80f008ee8", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x600000, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYRESDEC=r2, @ANYRES64=r3], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f0000000300)="0f32c4e3997f0a00b9800000c00f3235000800000f300f2188c4c1c5ed71acb9800000c00f3235004000000f30c4c3a9410f40c4c1f1f4dedea7006000000f09"}], 0xd38, 0x4, &(0x7f00000003c0)=[@vmwrite={0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffff}, @cr0={0x0, 0x20000000}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000200)={0x10000, 0x2, 0x0, 0x2000, &(0x7f000000e000/0x2000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1319.868281] FAULT_INJECTION: forcing a failure. [ 1319.868281] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.880358] CPU: 1 PID: 31112 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1319.888250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.897595] Call Trace: [ 1319.900178] dump_stack+0x1fc/0x2ef [ 1319.903811] should_fail.cold+0xa/0xf [ 1319.907605] ? is_bpf_text_address+0xfc/0x1b0 [ 1319.912088] ? setup_fault_attr+0x200/0x200 [ 1319.916406] ? kernel_text_address+0xbd/0xf0 [ 1319.920804] ? __kernel_text_address+0x9/0x30 [ 1319.925301] ? unwind_get_return_address+0x51/0x90 [ 1319.930477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.935831] __should_failslab+0x115/0x180 [ 1319.940053] should_failslab+0x5/0x10 [ 1319.943840] kmem_cache_alloc+0x3f/0x370 [ 1319.947895] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1319.953527] idr_get_free+0x50e/0xa10 [ 1319.957336] idr_alloc_u32+0x1a5/0x320 [ 1319.961226] ? __fprop_inc_percpu_max+0x210/0x210 [ 1319.966062] ? mark_held_locks+0xf0/0xf0 [ 1319.970118] ? debug_check_no_obj_freed+0x201/0x490 [ 1319.975120] ? mark_held_locks+0xf0/0xf0 [ 1319.979185] ? should_fail+0x142/0x7b0 [ 1319.983064] ? fs_reclaim_release+0xd0/0x110 [ 1319.987471] idr_alloc_cyclic+0x102/0x230 [ 1319.991607] ? idr_alloc+0x130/0x130 [ 1319.995308] ? __kernfs_new_node+0xf9/0x680 [ 1319.999617] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1320.004624] __kernfs_new_node+0x11a/0x680 [ 1320.008848] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1320.013607] ? __cpu_to_node+0x7b/0xa0 [ 1320.017483] ? account_entity_enqueue+0x2e5/0x440 [ 1320.022402] ? mark_held_locks+0xf0/0xf0 [ 1320.026447] ? enqueue_entity+0xf86/0x3850 [ 1320.030670] ? set_user_nice.part.0+0x3b9/0xab0 [ 1320.035347] kernfs_create_dir_ns+0x9e/0x230 [ 1320.039745] internal_create_group+0x1c1/0xb20 [ 1320.044320] ? sysfs_remove_link_from_group+0x70/0x70 [ 1320.049498] ? lock_downgrade+0x720/0x720 [ 1320.053646] lo_ioctl+0xf7c/0x20e0 [ 1320.057178] ? loop_set_status64+0x110/0x110 [ 1320.061746] blkdev_ioctl+0x5cb/0x1a80 [ 1320.065621] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1320.070971] ? blkpg_ioctl+0x9d0/0x9d0 [ 1320.074863] ? mark_held_locks+0xf0/0xf0 [ 1320.078913] ? mark_held_locks+0xf0/0xf0 [ 1320.082964] ? debug_check_no_obj_freed+0x201/0x490 [ 1320.087973] ? lock_downgrade+0x720/0x720 [ 1320.092112] block_ioctl+0xe9/0x130 [ 1320.095727] ? blkdev_fallocate+0x3f0/0x3f0 [ 1320.100123] do_vfs_ioctl+0xcdb/0x12e0 [ 1320.103999] ? lock_downgrade+0x720/0x720 [ 1320.108150] ? check_preemption_disabled+0x41/0x280 [ 1320.113167] ? ioctl_preallocate+0x200/0x200 [ 1320.117567] ? __fget+0x356/0x510 [ 1320.121010] ? do_dup2+0x450/0x450 [ 1320.124539] ? do_sys_open+0x2bf/0x520 [ 1320.128418] ksys_ioctl+0x9b/0xc0 [ 1320.131885] __x64_sys_ioctl+0x6f/0xb0 [ 1320.135766] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1320.140370] do_syscall_64+0xf9/0x620 [ 1320.144186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1320.149457] RIP: 0033:0x4663b7 [ 1320.152647] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1320.171547] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1320.179248] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1320.186504] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1320.193764] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1320.201021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1320.208664] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:50:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002023200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:50:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1320.333924] ISOFS: unable to read i-node block [ 1320.342609] isofs_fill_super: get root inode failed 09:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x23, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:50:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4238500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000280)="6e26660f38f8b039aa0f79b1d3000f09beb800d9f53e660f1ad7440f20c066350d000000440f22c0d2d536ff8ff17f", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0xfffffff8, 0x7ec, 0x84, 0x9, 0x2, 0x401], 0x6, 0x0, 0x0, 0xffffffffffffffff}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20400, 0x150) ioctl$KVM_RUN(r6, 0xae80, 0x0) 09:50:58 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002048200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1322.422456] FAULT_INJECTION: forcing a failure. [ 1322.422456] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.433926] CPU: 0 PID: 31159 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1322.441824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.451440] Call Trace: [ 1322.454037] dump_stack+0x1fc/0x2ef [ 1322.457700] should_fail.cold+0xa/0xf [ 1322.461504] ? is_bpf_text_address+0xfc/0x1b0 [ 1322.465990] ? setup_fault_attr+0x200/0x200 [ 1322.470313] ? kernel_text_address+0xbd/0xf0 [ 1322.474802] ? check_preemption_disabled+0x41/0x280 [ 1322.479814] __should_failslab+0x115/0x180 [ 1322.484040] should_failslab+0x5/0x10 [ 1322.487836] kmem_cache_alloc+0x3f/0x370 [ 1322.491888] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1322.497685] idr_get_free+0x50e/0xa10 [ 1322.501490] idr_alloc_u32+0x1a5/0x320 [ 1322.505369] ? __fprop_inc_percpu_max+0x210/0x210 [ 1322.510205] ? check_preemption_disabled+0x41/0x280 [ 1322.515214] ? check_preemption_disabled+0x41/0x280 [ 1322.520223] ? should_fail+0x142/0x7b0 [ 1322.524100] ? fs_reclaim_release+0xd0/0x110 [ 1322.528503] idr_alloc_cyclic+0x102/0x230 [ 1322.532639] ? idr_alloc+0x130/0x130 [ 1322.536430] ? __kernfs_new_node+0xf9/0x680 [ 1322.540754] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1322.545849] __kernfs_new_node+0x11a/0x680 [ 1322.550076] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1322.554907] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1322.559396] ? __cpu_to_node+0x7b/0xa0 [ 1322.563276] ? mark_held_locks+0xf0/0xf0 [ 1322.567323] ? io_schedule_timeout+0x140/0x140 [ 1322.571891] ? enqueue_entity+0xf86/0x3850 [ 1322.576113] ? set_user_nice.part.0+0x3b9/0xab0 [ 1322.580775] kernfs_create_dir_ns+0x9e/0x230 [ 1322.585176] internal_create_group+0x1c1/0xb20 [ 1322.589753] ? sysfs_remove_link_from_group+0x70/0x70 [ 1322.594929] ? lock_downgrade+0x720/0x720 [ 1322.599081] lo_ioctl+0xf7c/0x20e0 [ 1322.602611] ? loop_set_status64+0x110/0x110 [ 1322.607022] blkdev_ioctl+0x5cb/0x1a80 [ 1322.610985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.616332] ? blkpg_ioctl+0x9d0/0x9d0 [ 1322.620280] ? mark_held_locks+0xf0/0xf0 [ 1322.624341] ? mark_held_locks+0xf0/0xf0 [ 1322.628395] ? debug_check_no_obj_freed+0x201/0x490 [ 1322.633409] ? lock_downgrade+0x720/0x720 [ 1322.637545] block_ioctl+0xe9/0x130 [ 1322.641155] ? blkdev_fallocate+0x3f0/0x3f0 [ 1322.645467] do_vfs_ioctl+0xcdb/0x12e0 [ 1322.649348] ? lock_downgrade+0x720/0x720 [ 1322.653494] ? check_preemption_disabled+0x41/0x280 [ 1322.658497] ? ioctl_preallocate+0x200/0x200 [ 1322.662895] ? __fget+0x356/0x510 [ 1322.666336] ? do_dup2+0x450/0x450 [ 1322.669871] ? do_sys_open+0x2bf/0x520 [ 1322.673752] ksys_ioctl+0x9b/0xc0 [ 1322.677199] __x64_sys_ioctl+0x6f/0xb0 [ 1322.681073] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1322.685640] do_syscall_64+0xf9/0x620 [ 1322.689457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.694632] RIP: 0033:0x4663b7 [ 1322.697899] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1322.716787] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1322.724573] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1322.731827] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1322.739082] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1322.746338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1322.753604] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1322.791724] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 7 scanned by syz-executor.5 (31158) 09:50:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10001, 0x3, 0x0, 0x2000, &(0x7f0000012000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 09:50:58 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:50:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000060000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:50:58 executing program 3: sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) dup(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000240)=ANY=[@ANYBLOB="0100470497e5d305ce000000cc4e00"]) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000100)={0x5, 0x0, 0x0, 0x2, 0x7}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r0, 0x0, 0x100000001) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:50:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e005500580020002000200020002000200020002000204c200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1323.025073] FAULT_INJECTION: forcing a failure. [ 1323.025073] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.041573] CPU: 1 PID: 31197 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1323.049484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.058843] Call Trace: [ 1323.061438] dump_stack+0x1fc/0x2ef [ 1323.065068] should_fail.cold+0xa/0xf [ 1323.068867] ? setup_fault_attr+0x200/0x200 [ 1323.073191] ? lock_acquire+0x170/0x3c0 [ 1323.077157] __should_failslab+0x115/0x180 [ 1323.081385] should_failslab+0x5/0x10 [ 1323.085227] kmem_cache_alloc+0x277/0x370 [ 1323.089394] __kernfs_new_node+0xd2/0x680 [ 1323.093544] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1323.098302] ? __mutex_unlock_slowpath+0xea/0x610 [ 1323.103139] ? wait_for_completion_io+0x10/0x10 [ 1323.107800] ? kernfs_next_descendant_post+0x19c/0x290 [ 1323.113088] kernfs_new_node+0x92/0x120 [ 1323.117064] __kernfs_create_file+0x51/0x340 [ 1323.121471] sysfs_add_file_mode_ns+0x226/0x540 [ 1323.126146] internal_create_group+0x355/0xb20 [ 1323.130730] ? sysfs_remove_link_from_group+0x70/0x70 [ 1323.135907] ? lock_downgrade+0x720/0x720 [ 1323.140052] lo_ioctl+0xf7c/0x20e0 [ 1323.143595] ? loop_set_status64+0x110/0x110 [ 1323.148001] blkdev_ioctl+0x5cb/0x1a80 [ 1323.151877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.157231] ? blkpg_ioctl+0x9d0/0x9d0 [ 1323.161108] ? mark_held_locks+0xf0/0xf0 [ 1323.165158] ? mark_held_locks+0xf0/0xf0 [ 1323.169211] ? debug_check_no_obj_freed+0x201/0x490 [ 1323.174219] ? lock_downgrade+0x720/0x720 [ 1323.178354] block_ioctl+0xe9/0x130 [ 1323.181972] ? blkdev_fallocate+0x3f0/0x3f0 [ 1323.186282] do_vfs_ioctl+0xcdb/0x12e0 [ 1323.190160] ? lock_downgrade+0x720/0x720 [ 1323.194298] ? check_preemption_disabled+0x41/0x280 [ 1323.199302] ? ioctl_preallocate+0x200/0x200 [ 1323.203713] ? __fget+0x356/0x510 [ 1323.207156] ? do_dup2+0x450/0x450 [ 1323.210686] ? do_sys_open+0x2bf/0x520 [ 1323.214588] ksys_ioctl+0x9b/0xc0 [ 1323.218051] __x64_sys_ioctl+0x6f/0xb0 [ 1323.221948] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1323.226526] do_syscall_64+0xf9/0x620 [ 1323.230476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.235656] RIP: 0033:0x4663b7 [ 1323.238866] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.257931] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1323.265628] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1323.272970] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1323.280241] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1323.287496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1323.294750] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1323.475857] ISOFS: unable to read i-node block [ 1323.480707] isofs_fill_super: get root inode failed 09:51:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x25, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x3d5040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) dup3(r0, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, r6, &(0x7f0000498000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) 09:51:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4258500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:01 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002060200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1325.879755] FAULT_INJECTION: forcing a failure. [ 1325.879755] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.894117] CPU: 0 PID: 31252 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1325.902061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.911419] Call Trace: [ 1325.914015] dump_stack+0x1fc/0x2ef [ 1325.917648] should_fail.cold+0xa/0xf [ 1325.921457] ? setup_fault_attr+0x200/0x200 [ 1325.925783] ? lock_acquire+0x170/0x3c0 [ 1325.929768] __should_failslab+0x115/0x180 [ 1325.934010] should_failslab+0x5/0x10 [ 1325.937817] kmem_cache_alloc+0x277/0x370 [ 1325.941982] __kernfs_new_node+0xd2/0x680 [ 1325.946145] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1325.950907] ? __mutex_unlock_slowpath+0xea/0x610 [ 1325.955754] ? wait_for_completion_io+0x10/0x10 [ 1325.960427] ? kernfs_next_descendant_post+0x19c/0x290 [ 1325.965804] kernfs_new_node+0x92/0x120 [ 1325.969791] __kernfs_create_file+0x51/0x340 [ 1325.974212] sysfs_add_file_mode_ns+0x226/0x540 [ 1325.978889] internal_create_group+0x355/0xb20 [ 1325.983480] ? sysfs_remove_link_from_group+0x70/0x70 [ 1325.988672] ? lock_downgrade+0x720/0x720 [ 1325.992832] lo_ioctl+0xf7c/0x20e0 [ 1325.996424] ? loop_set_status64+0x110/0x110 [ 1326.000838] blkdev_ioctl+0x5cb/0x1a80 [ 1326.004730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.010100] ? blkpg_ioctl+0x9d0/0x9d0 [ 1326.013994] ? mark_held_locks+0xf0/0xf0 [ 1326.018061] ? mark_held_locks+0xf0/0xf0 [ 1326.022128] ? debug_check_no_obj_freed+0x201/0x490 [ 1326.027241] ? lock_downgrade+0x720/0x720 [ 1326.031396] block_ioctl+0xe9/0x130 [ 1326.035021] ? blkdev_fallocate+0x3f0/0x3f0 [ 1326.039345] do_vfs_ioctl+0xcdb/0x12e0 [ 1326.043234] ? lock_downgrade+0x720/0x720 [ 1326.047392] ? check_preemption_disabled+0x41/0x280 [ 1326.052439] ? ioctl_preallocate+0x200/0x200 [ 1326.056849] ? __fget+0x356/0x510 [ 1326.060305] ? do_dup2+0x450/0x450 [ 1326.063846] ? do_sys_open+0x2bf/0x520 [ 1326.067744] ksys_ioctl+0x9b/0xc0 [ 1326.071203] __x64_sys_ioctl+0x6f/0xb0 [ 1326.075179] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1326.079760] do_syscall_64+0xf9/0x620 [ 1326.083566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.088775] RIP: 0033:0x4663b7 [ 1326.091982] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1326.110892] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1326.118603] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1326.125876] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1326.133144] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1326.140415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1326.147681] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1326.176022] ISOFS: unable to read i-node block [ 1326.182026] isofs_fill_super: get root inode failed 09:51:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42a8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) ioctl$KVM_NMI(r3, 0xae9a) 09:51:02 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002068200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1326.449915] FAULT_INJECTION: forcing a failure. [ 1326.449915] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.461550] CPU: 1 PID: 31298 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1326.469566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.478912] Call Trace: [ 1326.481499] dump_stack+0x1fc/0x2ef [ 1326.485113] should_fail.cold+0xa/0xf [ 1326.488906] ? setup_fault_attr+0x200/0x200 [ 1326.493244] ? lock_acquire+0x170/0x3c0 [ 1326.497212] __should_failslab+0x115/0x180 [ 1326.501444] should_failslab+0x5/0x10 [ 1326.505245] kmem_cache_alloc+0x277/0x370 [ 1326.509396] __kernfs_new_node+0xd2/0x680 [ 1326.513548] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1326.518286] ? __mutex_unlock_slowpath+0xea/0x610 [ 1326.523110] ? wait_for_completion_io+0x10/0x10 [ 1326.527760] ? kernfs_next_descendant_post+0x19c/0x290 [ 1326.533028] kernfs_new_node+0x92/0x120 [ 1326.536985] __kernfs_create_file+0x51/0x340 [ 1326.541375] sysfs_add_file_mode_ns+0x226/0x540 [ 1326.546039] internal_create_group+0x355/0xb20 [ 1326.550605] ? sysfs_remove_link_from_group+0x70/0x70 [ 1326.555785] ? lock_downgrade+0x720/0x720 [ 1326.559921] lo_ioctl+0xf7c/0x20e0 [ 1326.563458] ? loop_set_status64+0x110/0x110 [ 1326.567852] blkdev_ioctl+0x5cb/0x1a80 [ 1326.571723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.577085] ? blkpg_ioctl+0x9d0/0x9d0 [ 1326.580974] ? mark_held_locks+0xf0/0xf0 [ 1326.585051] ? mark_held_locks+0xf0/0xf0 [ 1326.589120] ? debug_check_no_obj_freed+0x201/0x490 [ 1326.594643] ? lock_downgrade+0x720/0x720 [ 1326.598776] block_ioctl+0xe9/0x130 [ 1326.602397] ? blkdev_fallocate+0x3f0/0x3f0 [ 1326.606711] do_vfs_ioctl+0xcdb/0x12e0 [ 1326.610588] ? lock_downgrade+0x720/0x720 [ 1326.614727] ? check_preemption_disabled+0x41/0x280 [ 1326.619760] ? ioctl_preallocate+0x200/0x200 [ 1326.624155] ? __fget+0x356/0x510 [ 1326.627593] ? do_dup2+0x450/0x450 [ 1326.631117] ? do_sys_open+0x2bf/0x520 [ 1326.635001] ksys_ioctl+0x9b/0xc0 [ 1326.638453] __x64_sys_ioctl+0x6f/0xb0 [ 1326.642452] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1326.647025] do_syscall_64+0xf9/0x620 [ 1326.650813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.656005] RIP: 0033:0x4663b7 [ 1326.659202] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1326.678084] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1326.685774] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1326.693064] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1326.700326] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1326.707581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1326.714927] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x25, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x1000, &(0x7f000000b000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x4000, 0xc000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42b8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:04 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e005500580020002000200020002000200020002000206c200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000100000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1328.890819] FAULT_INJECTION: forcing a failure. [ 1328.890819] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.917709] CPU: 0 PID: 31328 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1328.925645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.935013] Call Trace: [ 1328.937597] dump_stack+0x1fc/0x2ef [ 1328.941215] should_fail.cold+0xa/0xf [ 1328.945007] ? setup_fault_attr+0x200/0x200 [ 1328.949319] ? lock_acquire+0x170/0x3c0 [ 1328.953288] __should_failslab+0x115/0x180 [ 1328.957512] should_failslab+0x5/0x10 [ 1328.961303] kmem_cache_alloc+0x277/0x370 [ 1328.965442] __kernfs_new_node+0xd2/0x680 [ 1328.969579] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1328.974323] ? __mutex_unlock_slowpath+0xea/0x610 [ 1328.979161] ? wait_for_completion_io+0x10/0x10 [ 1328.983818] ? kernfs_next_descendant_post+0x19c/0x290 [ 1328.989096] kernfs_new_node+0x92/0x120 [ 1328.993061] __kernfs_create_file+0x51/0x340 [ 1328.997465] sysfs_add_file_mode_ns+0x226/0x540 [ 1329.002125] internal_create_group+0x355/0xb20 [ 1329.006705] ? sysfs_remove_link_from_group+0x70/0x70 [ 1329.011880] ? lock_downgrade+0x720/0x720 [ 1329.016026] lo_ioctl+0xf7c/0x20e0 [ 1329.019556] ? loop_set_status64+0x110/0x110 [ 1329.023963] blkdev_ioctl+0x5cb/0x1a80 [ 1329.027840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.033189] ? blkpg_ioctl+0x9d0/0x9d0 [ 1329.037063] ? mark_held_locks+0xf0/0xf0 [ 1329.041127] ? mark_held_locks+0xf0/0xf0 [ 1329.045176] ? debug_check_no_obj_freed+0x201/0x490 [ 1329.050358] ? lock_downgrade+0x720/0x720 [ 1329.054493] block_ioctl+0xe9/0x130 [ 1329.058123] ? blkdev_fallocate+0x3f0/0x3f0 [ 1329.062433] do_vfs_ioctl+0xcdb/0x12e0 [ 1329.066321] ? lock_downgrade+0x720/0x720 [ 1329.070454] ? check_preemption_disabled+0x41/0x280 [ 1329.075466] ? ioctl_preallocate+0x200/0x200 [ 1329.079861] ? __fget+0x356/0x510 [ 1329.083300] ? do_dup2+0x450/0x450 [ 1329.086832] ? do_sys_open+0x2bf/0x520 [ 1329.090807] ksys_ioctl+0x9b/0xc0 [ 1329.094252] __x64_sys_ioctl+0x6f/0xb0 [ 1329.098127] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1329.102704] do_syscall_64+0xf9/0x620 [ 1329.106498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.111673] RIP: 0033:0x4663b7 [ 1329.114850] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.133822] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1329.141519] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1329.148790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1329.156042] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1329.163304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1329.170565] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:05 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000100)={0x81, 0x0, [0x10000, 0x10000, 0x0, 0xb870]}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42d8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002074200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1329.388223] FAULT_INJECTION: forcing a failure. [ 1329.388223] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.405466] CPU: 1 PID: 31359 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1329.413373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.422729] Call Trace: [ 1329.425327] dump_stack+0x1fc/0x2ef [ 1329.428964] should_fail.cold+0xa/0xf [ 1329.432771] ? setup_fault_attr+0x200/0x200 [ 1329.437096] ? lock_acquire+0x170/0x3c0 [ 1329.441080] ? dev_uevent_filter+0xd0/0xd0 [ 1329.445316] __should_failslab+0x115/0x180 [ 1329.449560] should_failslab+0x5/0x10 [ 1329.453364] kmem_cache_alloc_trace+0x284/0x380 [ 1329.458039] ? dev_uevent_filter+0xd0/0xd0 [ 1329.462277] kobject_uevent_env+0x236/0x1480 [ 1329.466703] lo_ioctl+0xff9/0x20e0 [ 1329.470421] ? loop_set_status64+0x110/0x110 [ 1329.474833] blkdev_ioctl+0x5cb/0x1a80 [ 1329.478726] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.484092] ? blkpg_ioctl+0x9d0/0x9d0 [ 1329.487984] ? mark_held_locks+0xf0/0xf0 [ 1329.492055] ? mark_held_locks+0xf0/0xf0 [ 1329.496122] ? debug_check_no_obj_freed+0x201/0x490 [ 1329.501144] ? lock_downgrade+0x720/0x720 [ 1329.505295] block_ioctl+0xe9/0x130 [ 1329.508922] ? blkdev_fallocate+0x3f0/0x3f0 [ 1329.513252] do_vfs_ioctl+0xcdb/0x12e0 [ 1329.517141] ? lock_downgrade+0x720/0x720 [ 1329.521292] ? check_preemption_disabled+0x41/0x280 [ 1329.526308] ? ioctl_preallocate+0x200/0x200 [ 1329.530721] ? __fget+0x356/0x510 [ 1329.534206] ? do_dup2+0x450/0x450 [ 1329.537747] ? do_sys_open+0x2bf/0x520 [ 1329.541648] ksys_ioctl+0x9b/0xc0 [ 1329.545106] __x64_sys_ioctl+0x6f/0xb0 [ 1329.548996] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1329.553580] do_syscall_64+0xf9/0x620 [ 1329.557390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.562575] RIP: 0033:0x4663b7 [ 1329.565769] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.584665] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1329.592378] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1329.599644] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1329.606903] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1329.614163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1329.621434] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000000003f0000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1329.793260] ISOFS: unable to read i-node block [ 1329.805278] isofs_fill_super: get root inode failed 09:51:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x25, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:07 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42f8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000216400000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e005500580020002000200020002000200020002000207a200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1331.930665] ISOFS: unable to read i-node block [ 1331.936706] FAULT_INJECTION: forcing a failure. [ 1331.936706] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.942322] isofs_fill_super: get root inode failed [ 1331.956726] CPU: 0 PID: 31425 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1331.964622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.974078] Call Trace: [ 1331.976659] dump_stack+0x1fc/0x2ef [ 1331.980279] should_fail.cold+0xa/0xf [ 1331.984077] ? setup_fault_attr+0x200/0x200 [ 1331.988406] ? lock_acquire+0x170/0x3c0 [ 1331.992371] __should_failslab+0x115/0x180 [ 1331.996597] should_failslab+0x5/0x10 [ 1332.000661] kmem_cache_alloc_node+0x245/0x3b0 [ 1332.005247] __alloc_skb+0x71/0x560 [ 1332.008877] alloc_uevent_skb+0x7b/0x210 [ 1332.012932] kobject_uevent_env+0xa90/0x1480 [ 1332.017339] lo_ioctl+0xff9/0x20e0 [ 1332.020875] ? loop_set_status64+0x110/0x110 [ 1332.025274] blkdev_ioctl+0x5cb/0x1a80 [ 1332.029150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.034500] ? blkpg_ioctl+0x9d0/0x9d0 [ 1332.038457] ? mark_held_locks+0xf0/0xf0 [ 1332.042605] ? mark_held_locks+0xf0/0xf0 [ 1332.046660] ? debug_check_no_obj_freed+0x201/0x490 [ 1332.051683] ? lock_downgrade+0x720/0x720 [ 1332.055818] block_ioctl+0xe9/0x130 [ 1332.059445] ? blkdev_fallocate+0x3f0/0x3f0 [ 1332.063749] do_vfs_ioctl+0xcdb/0x12e0 [ 1332.067622] ? lock_downgrade+0x720/0x720 [ 1332.071764] ? check_preemption_disabled+0x41/0x280 [ 1332.076784] ? ioctl_preallocate+0x200/0x200 [ 1332.081180] ? __fget+0x356/0x510 [ 1332.084646] ? do_dup2+0x450/0x450 [ 1332.088172] ? do_sys_open+0x2bf/0x520 [ 1332.092043] ksys_ioctl+0x9b/0xc0 [ 1332.095493] __x64_sys_ioctl+0x6f/0xb0 [ 1332.099363] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1332.103947] do_syscall_64+0xf9/0x620 [ 1332.107754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.112927] RIP: 0033:0x4663b7 09:51:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001f80)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/218, 0xda}, {&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/26, 0x1a}, {&(0x7f0000001400)=""/72, 0x48}, {&(0x7f0000001480)=""/88, 0x58}], 0x6, &(0x7f0000001580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001640)=""/88, 0x58}, {&(0x7f00000016c0)=""/36, 0x24}, {&(0x7f0000001700)=""/237, 0xed}, {&(0x7f0000001800)=""/117, 0x75}, {&(0x7f0000001880)=""/32, 0x20}, {&(0x7f00000018c0)=""/176, 0xb0}, {&(0x7f0000001980)=""/148, 0x94}, {&(0x7f0000001a40)=""/88, 0x58}], 0x8, &(0x7f0000001b40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001c40)=""/212, 0xd4}], 0x1, &(0x7f0000001d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000001e00)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/97, 0x61}], 0x1, &(0x7f0000001f40)}}], 0x4, 0x2041, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000002100)=[@text64={0x40, &(0x7f0000002080)="f30fc77663470f790500000000da223e66f3440f09c7442400ef000000c744240200400000ff1c24d9edb99b080000b80e000000ba000000000f300f01cb670f01d1f245d9ff", 0x46}], 0x1, 0x24, &(0x7f0000002140), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1332.116116] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.135030] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1332.142726] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1332.150077] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1332.157338] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1332.164591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1332.171848] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4308500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:08 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:08 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) write$P9_RWSTAT(r0, &(0x7f00000001c0)={0x7, 0x7f, 0x2}, 0x7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x33) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="20000000370100010600000000000000070080", @ANYRES32=r4, @ANYBLOB="02005b3a"], 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0xd000, 0x1000, &(0x7f0000008000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="66f30fc777ac0fc206e2bc000f06640f01c30fc7b8c8b0bf23f8dab4000867640fc79bbde269340f015c7e660f59900000", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000300)="3e0fc72e0b00f2660f21f366b9800000c00f326635008000000f300f09660f38829e248d67660f3882441208660ffc821400dc0e800066b9b80b000066b80098000066ba000000000f300f00de", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$nbd(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="674466980000000004000400020000006398acf148a2e66f329e1e638518f71af4ae322b8e76f287545ed8c6ada4e88312cb079f97569c24867695d388156620a0de542dfaef3defe7b46453"], 0x4c) [ 1332.450661] FAULT_INJECTION: forcing a failure. [ 1332.450661] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.462351] CPU: 0 PID: 31466 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1332.470238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.479667] Call Trace: [ 1332.482251] dump_stack+0x1fc/0x2ef [ 1332.485874] should_fail.cold+0xa/0xf [ 1332.489676] ? setup_fault_attr+0x200/0x200 [ 1332.493988] ? lock_acquire+0x170/0x3c0 [ 1332.497984] __should_failslab+0x115/0x180 [ 1332.502220] should_failslab+0x5/0x10 [ 1332.506035] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1332.511129] __kmalloc_node_track_caller+0x38/0x70 [ 1332.516050] __alloc_skb+0xae/0x560 [ 1332.519757] alloc_uevent_skb+0x7b/0x210 [ 1332.523812] kobject_uevent_env+0xa90/0x1480 [ 1332.528218] lo_ioctl+0xff9/0x20e0 [ 1332.531755] ? loop_set_status64+0x110/0x110 [ 1332.536153] blkdev_ioctl+0x5cb/0x1a80 [ 1332.540211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.545580] ? blkpg_ioctl+0x9d0/0x9d0 [ 1332.549458] ? mark_held_locks+0xf0/0xf0 [ 1332.553507] ? mark_held_locks+0xf0/0xf0 [ 1332.557577] ? debug_check_no_obj_freed+0x201/0x490 [ 1332.562589] ? lock_downgrade+0x720/0x720 [ 1332.566738] block_ioctl+0xe9/0x130 [ 1332.570360] ? blkdev_fallocate+0x3f0/0x3f0 [ 1332.574677] do_vfs_ioctl+0xcdb/0x12e0 [ 1332.578555] ? lock_downgrade+0x720/0x720 [ 1332.582693] ? check_preemption_disabled+0x41/0x280 [ 1332.587822] ? ioctl_preallocate+0x200/0x200 [ 1332.592220] ? __fget+0x356/0x510 [ 1332.595679] ? do_dup2+0x450/0x450 [ 1332.599217] ? do_sys_open+0x2bf/0x520 [ 1332.603098] ksys_ioctl+0x9b/0xc0 [ 1332.606543] __x64_sys_ioctl+0x6f/0xb0 [ 1332.610417] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1332.614987] do_syscall_64+0xf9/0x620 [ 1332.620360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.625542] RIP: 0033:0x4663b7 [ 1332.628748] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.647647] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1332.655341] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1332.662597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1332.669849] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1332.677102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1332.684356] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x26, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e43d8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e005500580020002000200020002000200020002000208b200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x80000001]}, 0x8, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x7ff, 0x0, 0x0, 0x40, 0xbe, 0x4, 0x1, 0x7, 0xaf8, 0xfff, 0x4, 0x3, 0x5, 0x8, 0x6], 0x10000, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)=0x7) r4 = syz_open_dev$radio(&(0x7f0000000140), 0x0, 0x2) r5 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r5, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r5, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r5, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000340)={0x4, 0x1301, 0xfff, r5, 0x0, &(0x7f0000000300)={0x990af7, 0x0, '\x00', @value64=0x4}}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000280)="66ba4200b83e0c66f2ef66b80e018ec866baa100ed400f300f06420f01c4c4c17d118c8800600000420f212a36460f01f826f2440f12d1"}], 0xaaaaaaaaaaaac32, 0x0, 0x0, 0x37) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000fffffdfc0000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:10 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1334.939811] ISOFS: unable to read i-node block [ 1334.952544] isofs_fill_super: get root inode failed 09:51:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1335.028348] FAULT_INJECTION: forcing a failure. [ 1335.028348] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.039926] CPU: 1 PID: 31504 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1335.047812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.057310] Call Trace: [ 1335.059886] dump_stack+0x1fc/0x2ef [ 1335.063528] should_fail.cold+0xa/0xf [ 1335.067316] ? setup_fault_attr+0x200/0x200 [ 1335.071628] ? lock_acquire+0x170/0x3c0 [ 1335.075590] ? dev_uevent_filter+0xd0/0xd0 [ 1335.079802] __should_failslab+0x115/0x180 [ 1335.084020] should_failslab+0x5/0x10 [ 1335.087826] kmem_cache_alloc_trace+0x284/0x380 [ 1335.092475] ? dev_uevent_filter+0xd0/0xd0 [ 1335.096690] kobject_uevent_env+0x236/0x1480 [ 1335.101085] lo_ioctl+0xff9/0x20e0 [ 1335.104621] ? loop_set_status64+0x110/0x110 [ 1335.109009] blkdev_ioctl+0x5cb/0x1a80 [ 1335.112878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.118237] ? blkpg_ioctl+0x9d0/0x9d0 [ 1335.122138] ? mark_held_locks+0xf0/0xf0 [ 1335.126339] ? mark_held_locks+0xf0/0xf0 [ 1335.130512] ? debug_check_no_obj_freed+0x201/0x490 [ 1335.135530] ? lock_downgrade+0x720/0x720 [ 1335.139659] block_ioctl+0xe9/0x130 [ 1335.143271] ? blkdev_fallocate+0x3f0/0x3f0 [ 1335.147585] do_vfs_ioctl+0xcdb/0x12e0 [ 1335.151478] ? lock_downgrade+0x720/0x720 [ 1335.155617] ? check_preemption_disabled+0x41/0x280 [ 1335.160617] ? ioctl_preallocate+0x200/0x200 [ 1335.165012] ? __fget+0x356/0x510 [ 1335.168447] ? do_dup2+0x450/0x450 [ 1335.171966] ? do_sys_open+0x2bf/0x520 [ 1335.175837] ksys_ioctl+0x9b/0xc0 [ 1335.179274] __x64_sys_ioctl+0x6f/0xb0 [ 1335.183139] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1335.187699] do_syscall_64+0xf9/0x620 [ 1335.191483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.196660] RIP: 0033:0x4663b7 [ 1335.199835] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.218719] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1335.226511] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1335.233759] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1335.241022] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1335.248322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1335.255584] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.log\x00', 0x381500, 0x30) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xfffffffffffffffc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x1, 0x0, 0x10000, 0x2000, &(0x7f0000006000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x3, 0x2000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:51:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000220020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4488500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1335.538722] ISOFS: unable to read i-node block [ 1335.552852] isofs_fill_super: get root inode failed 09:51:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x26, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:13 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000100)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r4, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r4, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) sendfile(r4, r1, 0x0, 0x100000001) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000250020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8502000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1337.998628] ISOFS: unable to read i-node block [ 1338.013062] isofs_fill_super: get root inode failed [ 1338.019302] FAULT_INJECTION: forcing a failure. [ 1338.019302] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.031346] CPU: 1 PID: 31598 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1338.039235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.048577] Call Trace: [ 1338.051155] dump_stack+0x1fc/0x2ef [ 1338.054786] should_fail.cold+0xa/0xf [ 1338.058618] ? setup_fault_attr+0x200/0x200 [ 1338.062918] ? lock_acquire+0x170/0x3c0 [ 1338.066888] __should_failslab+0x115/0x180 [ 1338.071108] should_failslab+0x5/0x10 [ 1338.074892] kmem_cache_alloc_node+0x245/0x3b0 [ 1338.079462] __alloc_skb+0x71/0x560 [ 1338.083079] alloc_uevent_skb+0x7b/0x210 [ 1338.087141] kobject_uevent_env+0xa90/0x1480 [ 1338.091556] lo_ioctl+0xff9/0x20e0 [ 1338.095082] ? loop_set_status64+0x110/0x110 [ 1338.099483] blkdev_ioctl+0x5cb/0x1a80 [ 1338.103426] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.108792] ? blkpg_ioctl+0x9d0/0x9d0 [ 1338.112672] ? mark_held_locks+0xf0/0xf0 [ 1338.116809] ? mark_held_locks+0xf0/0xf0 [ 1338.120857] ? debug_check_no_obj_freed+0x201/0x490 [ 1338.125882] ? lock_downgrade+0x720/0x720 [ 1338.130033] block_ioctl+0xe9/0x130 [ 1338.133646] ? blkdev_fallocate+0x3f0/0x3f0 [ 1338.137965] do_vfs_ioctl+0xcdb/0x12e0 [ 1338.141844] ? lock_downgrade+0x720/0x720 [ 1338.145983] ? check_preemption_disabled+0x41/0x280 [ 1338.151003] ? ioctl_preallocate+0x200/0x200 [ 1338.155496] ? __fget+0x356/0x510 [ 1338.158938] ? do_dup2+0x450/0x450 [ 1338.162460] ? do_sys_open+0x2bf/0x520 [ 1338.166346] ksys_ioctl+0x9b/0xc0 [ 1338.169792] __x64_sys_ioctl+0x6f/0xb0 [ 1338.173663] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1338.178228] do_syscall_64+0xf9/0x620 [ 1338.182015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.187191] RIP: 0033:0x4663b7 [ 1338.190366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1338.209249] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1338.217039] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1338.224318] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1338.231570] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1338.238817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1338.246075] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000010132088ffffffff0000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x39, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:14 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000320020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8503000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1338.480300] FAULT_INJECTION: forcing a failure. [ 1338.480300] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.532065] CPU: 1 PID: 31648 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1338.539985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.549333] Call Trace: [ 1338.552008] dump_stack+0x1fc/0x2ef [ 1338.555652] should_fail.cold+0xa/0xf [ 1338.559444] ? setup_fault_attr+0x200/0x200 [ 1338.563769] ? lock_acquire+0x170/0x3c0 [ 1338.567737] __should_failslab+0x115/0x180 [ 1338.571964] should_failslab+0x5/0x10 [ 1338.576539] kmem_cache_alloc+0x277/0x370 [ 1338.580679] getname_flags+0xce/0x590 [ 1338.584598] do_mkdirat+0x8d/0x2d0 [ 1338.588132] ? __ia32_sys_mknod+0x120/0x120 [ 1338.592444] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1338.597795] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1338.602814] ? do_syscall_64+0x21/0x620 [ 1338.606784] do_syscall_64+0xf9/0x620 [ 1338.610580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.615774] RIP: 0033:0x465707 [ 1338.618960] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1338.637850] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1338.645550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1338.652808] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1338.660064] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1338.667329] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1338.674582] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x26, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = signalfd(r0, &(0x7f0000000100)={[0x100000000]}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x1, 0x2, 0x100000, 0x2000, &(0x7f0000016000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:51:16 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000370020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1341.075692] FAULT_INJECTION: forcing a failure. [ 1341.075692] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.100972] CPU: 0 PID: 31691 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1341.108977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.118331] Call Trace: [ 1341.120916] dump_stack+0x1fc/0x2ef [ 1341.124543] should_fail.cold+0xa/0xf [ 1341.128333] ? setup_fault_attr+0x200/0x200 [ 1341.132652] ? lock_acquire+0x170/0x3c0 [ 1341.136629] __should_failslab+0x115/0x180 [ 1341.140864] should_failslab+0x5/0x10 [ 1341.144665] kmem_cache_alloc_trace+0x284/0x380 [ 1341.149321] ? wait_for_completion_io+0x10/0x10 [ 1341.153988] ? kobj_ns_initial+0x90/0x90 [ 1341.158038] call_usermodehelper_setup+0x84/0x300 [ 1341.162870] kobject_uevent_env+0xe83/0x1480 [ 1341.167273] lo_ioctl+0xff9/0x20e0 [ 1341.170804] ? loop_set_status64+0x110/0x110 [ 1341.175202] blkdev_ioctl+0x5cb/0x1a80 [ 1341.179096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.184445] ? blkpg_ioctl+0x9d0/0x9d0 [ 1341.188322] ? mark_held_locks+0xf0/0xf0 [ 1341.192367] ? mark_held_locks+0xf0/0xf0 [ 1341.196436] ? debug_check_no_obj_freed+0x201/0x490 [ 1341.201454] ? lock_downgrade+0x720/0x720 [ 1341.205606] block_ioctl+0xe9/0x130 [ 1341.209235] ? blkdev_fallocate+0x3f0/0x3f0 [ 1341.213571] do_vfs_ioctl+0xcdb/0x12e0 [ 1341.217540] ? lock_downgrade+0x720/0x720 [ 1341.221685] ? check_preemption_disabled+0x41/0x280 [ 1341.226685] ? ioctl_preallocate+0x200/0x200 [ 1341.231084] ? __fget+0x356/0x510 [ 1341.234532] ? do_dup2+0x450/0x450 [ 1341.238066] ? do_sys_open+0x2bf/0x520 [ 1341.241945] ksys_ioctl+0x9b/0xc0 [ 1341.245387] __x64_sys_ioctl+0x6f/0xb0 [ 1341.249262] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1341.253833] do_syscall_64+0xf9/0x620 [ 1341.257627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.262801] RIP: 0033:0x4663b7 [ 1341.265995] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.284889] RSP: 002b:00007f4b7890ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1341.292580] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 1341.300111] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1341.307364] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1341.314626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1341.321878] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 09:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x5, 0x0, 0x9, 0x2, 0x69, 0x2, 0x3, 0x55, 0x75, 0x1f, 0x7, 0x0, 0x5f687811}, {0x5, 0x0, 0x6, 0x81, 0x33, 0x6, 0xd6, 0xf9, 0x7, 0x0, 0x2, 0xcc, 0x3}, {0x4, 0x4, 0x1, 0x7, 0x6, 0x3, 0x3, 0x2, 0x7f, 0x40, 0x20, 0x4, 0x5}], 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x220880, 0x0) ioctl$KVM_HYPERV_EVENTFD(r5, 0x4018aebd, &(0x7f0000000380)={0x3, r6, 0x1}) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000240)="0f01f8260f01cb2ef347d9f9663e3e67f20f019951000000f3470fc77774660f2ebdd54c0000460f3566440fc7b300100000360f215266440f3a08223e", 0x3d}], 0x1, 0x8, &(0x7f0000000300)=[@vmwrite={0x8, 0x0, 0x1e, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10000, 0x1, 0x4, 0x1000, &(0x7f0000000000/0x1000)=nil}) 09:51:17 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020003f0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1341.592646] FAULT_INJECTION: forcing a failure. [ 1341.592646] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.622427] CPU: 0 PID: 31742 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1341.630349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.639705] Call Trace: [ 1341.642306] dump_stack+0x1fc/0x2ef [ 1341.645943] should_fail.cold+0xa/0xf [ 1341.649752] ? setup_fault_attr+0x200/0x200 [ 1341.654074] ? lock_acquire+0x170/0x3c0 [ 1341.658080] __should_failslab+0x115/0x180 [ 1341.662308] should_failslab+0x5/0x10 [ 1341.666097] kmem_cache_alloc+0x277/0x370 [ 1341.670235] getname_flags+0xce/0x590 [ 1341.674027] do_mkdirat+0x8d/0x2d0 [ 1341.677570] ? __ia32_sys_mknod+0x120/0x120 [ 1341.681967] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1341.687321] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1341.692339] ? do_syscall_64+0x21/0x620 [ 1341.696303] do_syscall_64+0xf9/0x620 [ 1341.700095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.705273] RIP: 0033:0x465707 [ 1341.708457] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.727864] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1341.735563] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 09:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1341.742840] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1341.750095] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1341.757356] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1341.764632] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8505000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:17 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1341.923725] FAULT_INJECTION: forcing a failure. [ 1341.923725] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.939245] CPU: 1 PID: 31779 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1341.947153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.956512] Call Trace: [ 1341.959137] dump_stack+0x1fc/0x2ef [ 1341.962777] should_fail.cold+0xa/0xf [ 1341.966589] ? setup_fault_attr+0x200/0x200 [ 1341.970965] __should_failslab+0x115/0x180 [ 1341.975212] should_failslab+0x5/0x10 [ 1341.979031] kmem_cache_alloc+0x277/0x370 [ 1341.983187] ? ext4_sync_fs+0x8d0/0x8d0 [ 1341.987171] ext4_alloc_inode+0x1a/0x630 [ 1341.991247] ? ext4_sync_fs+0x8d0/0x8d0 [ 1341.995229] alloc_inode+0x5d/0x180 [ 1341.998867] new_inode+0x1d/0xf0 [ 1342.002250] __ext4_new_inode+0x400/0x5a20 [ 1342.006491] ? putname+0xe1/0x120 [ 1342.009947] ? do_mkdirat+0xa0/0x2d0 [ 1342.013673] ? ext4_free_inode+0x1780/0x1780 [ 1342.018086] ? debug_check_no_obj_freed+0x201/0x490 [ 1342.023105] ? __dquot_initialize+0x298/0xb70 [ 1342.027608] ? lock_acquire+0x170/0x3c0 [ 1342.031590] ? dquot_initialize_needed+0x290/0x290 [ 1342.036535] ? trace_hardirqs_off+0x64/0x200 [ 1342.040958] ? common_perm+0x4be/0x800 [ 1342.044851] ext4_mkdir+0x396/0xe10 [ 1342.048483] ? putname+0xe1/0x120 [ 1342.051941] ? ext4_init_dot_dotdot+0x600/0x600 [ 1342.056614] ? generic_permission+0x116/0x4d0 [ 1342.061116] ? security_inode_permission+0xc5/0xf0 [ 1342.066055] ? inode_permission.part.0+0x10c/0x450 [ 1342.071021] vfs_mkdir+0x508/0x7a0 [ 1342.074567] do_mkdirat+0x262/0x2d0 [ 1342.078199] ? __ia32_sys_mknod+0x120/0x120 [ 1342.082531] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1342.087553] ? do_syscall_64+0x21/0x620 [ 1342.091538] do_syscall_64+0xf9/0x620 [ 1342.095348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.100535] RIP: 0033:0x465707 [ 1342.103731] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:51:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000060000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000440020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1342.122838] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1342.130554] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1342.137833] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1342.145108] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.152475] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1342.159756] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8506000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:18 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8507000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000600020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1342.587461] FAULT_INJECTION: forcing a failure. [ 1342.587461] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.631153] CPU: 0 PID: 31816 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1342.639074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.648465] Call Trace: [ 1342.651064] dump_stack+0x1fc/0x2ef [ 1342.654742] should_fail.cold+0xa/0xf [ 1342.658556] ? setup_fault_attr+0x200/0x200 [ 1342.662889] __should_failslab+0x115/0x180 [ 1342.667138] should_failslab+0x5/0x10 [ 1342.670942] kmem_cache_alloc+0x277/0x370 [ 1342.675100] ? ext4_sync_fs+0x8d0/0x8d0 [ 1342.679087] ext4_alloc_inode+0x1a/0x630 [ 1342.683155] ? ext4_sync_fs+0x8d0/0x8d0 [ 1342.687304] alloc_inode+0x5d/0x180 [ 1342.690932] new_inode+0x1d/0xf0 [ 1342.694301] __ext4_new_inode+0x400/0x5a20 [ 1342.698540] ? putname+0xe1/0x120 [ 1342.701991] ? do_mkdirat+0xa0/0x2d0 [ 1342.705715] ? ext4_free_inode+0x1780/0x1780 [ 1342.710122] ? debug_check_no_obj_freed+0x201/0x490 [ 1342.715145] ? __dquot_initialize+0x298/0xb70 [ 1342.719823] ? lock_acquire+0x170/0x3c0 [ 1342.723804] ? dquot_initialize_needed+0x290/0x290 [ 1342.728741] ? trace_hardirqs_off+0x64/0x200 [ 1342.733173] ? common_perm+0x4be/0x800 [ 1342.737072] ext4_mkdir+0x396/0xe10 [ 1342.740709] ? putname+0xe1/0x120 [ 1342.744184] ? ext4_init_dot_dotdot+0x600/0x600 [ 1342.748862] ? generic_permission+0x116/0x4d0 [ 1342.753360] ? security_inode_permission+0xc5/0xf0 [ 1342.758295] ? inode_permission.part.0+0x10c/0x450 [ 1342.763263] vfs_mkdir+0x508/0x7a0 [ 1342.766808] do_mkdirat+0x262/0x2d0 [ 1342.770436] ? __ia32_sys_mknod+0x120/0x120 [ 1342.774768] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1342.779786] ? do_syscall_64+0x21/0x620 [ 1342.783769] do_syscall_64+0xf9/0x620 [ 1342.787580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.792775] RIP: 0033:0x465707 [ 1342.795967] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.814867] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1342.822577] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 09:51:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8508000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1342.829844] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1342.837117] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.844387] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1342.851754] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:18 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1343.066649] FAULT_INJECTION: forcing a failure. [ 1343.066649] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.086460] CPU: 1 PID: 31846 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1343.094370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.103729] Call Trace: [ 1343.106330] dump_stack+0x1fc/0x2ef [ 1343.109974] should_fail.cold+0xa/0xf [ 1343.113790] ? setup_fault_attr+0x200/0x200 [ 1343.118145] ? __lock_acquire+0x6de/0x3ff0 [ 1343.122399] __should_failslab+0x115/0x180 [ 1343.126644] should_failslab+0x5/0x10 [ 1343.130450] __kmalloc+0x2ab/0x3c0 [ 1343.133999] ? ext4_find_extent+0x9bb/0xc70 [ 1343.138331] ext4_find_extent+0x9bb/0xc70 [ 1343.142496] ext4_ext_map_blocks+0x1c0/0x7390 [ 1343.147029] ? __lock_acquire+0x6de/0x3ff0 [ 1343.151277] ? __lock_acquire+0x6de/0x3ff0 [ 1343.155696] ? mark_held_locks+0xf0/0xf0 [ 1343.159766] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1343.165140] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1343.170346] ? mark_held_locks+0xf0/0xf0 [ 1343.174420] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1343.179291] ? ext4_es_lookup_extent+0x375/0xb60 [ 1343.184057] ? lock_downgrade+0x720/0x720 [ 1343.188210] ? lock_acquire+0x170/0x3c0 [ 1343.192195] ? check_preemption_disabled+0x41/0x280 [ 1343.197220] ? lock_acquire+0x170/0x3c0 [ 1343.201202] ? ext4_map_blocks+0x33e/0x1a50 [ 1343.205536] ext4_map_blocks+0xd88/0x1a50 [ 1343.209697] ? check_preemption_disabled+0x41/0x280 [ 1343.214716] ? ext4_issue_zeroout+0x160/0x160 [ 1343.219215] ? __brelse+0x84/0xa0 [ 1343.222675] ? __ext4_new_inode+0x2eb/0x5a20 [ 1343.227094] ext4_getblk+0xad/0x4f0 [ 1343.230725] ? ext4_iomap_begin+0xe00/0xe00 [ 1343.235048] ? ext4_free_inode+0x1780/0x1780 [ 1343.239457] ? debug_check_no_obj_freed+0x201/0x490 [ 1343.244479] ? __dquot_initialize+0x298/0xb70 [ 1343.248980] ext4_bread+0x7c/0x210 [ 1343.252613] ? ext4_getblk+0x4f0/0x4f0 [ 1343.256499] ? dquot_initialize_needed+0x290/0x290 [ 1343.261431] ? trace_hardirqs_off+0x64/0x200 [ 1343.265844] ext4_append+0x155/0x370 [ 1343.269570] ext4_mkdir+0x5bd/0xe10 [ 1343.273214] ? ext4_init_dot_dotdot+0x600/0x600 [ 1343.277886] ? generic_permission+0x116/0x4d0 [ 1343.282407] ? inode_permission.part.0+0x10c/0x450 [ 1343.287343] vfs_mkdir+0x508/0x7a0 [ 1343.290892] do_mkdirat+0x262/0x2d0 [ 1343.294523] ? __ia32_sys_mknod+0x120/0x120 [ 1343.298852] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1343.303871] ? do_syscall_64+0x21/0x620 [ 1343.307848] do_syscall_64+0xf9/0x620 [ 1343.311655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.316889] RIP: 0033:0x465707 [ 1343.320087] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.338988] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1343.346703] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1343.353982] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1343.361343] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1343.368616] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1343.375887] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000080000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8509000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020038e0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:20 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:20 executing program 3: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082dbd7000bfdbdf25050000000800038ea0561b911f964800080000000f07020000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20040000) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000100)={0x3, 0x1, {0x2, 0x2, 0x6f5f, 0x3, 0x5}, 0xcb8}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1344.879356] FAULT_INJECTION: forcing a failure. [ 1344.879356] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1344.891191] CPU: 1 PID: 31868 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1344.899075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.908437] Call Trace: [ 1344.911025] dump_stack+0x1fc/0x2ef [ 1344.914647] should_fail.cold+0xa/0xf [ 1344.918439] ? setup_fault_attr+0x200/0x200 [ 1344.922758] ? wake_up_q+0x93/0xe0 [ 1344.926308] ? __mutex_unlock_slowpath+0x2be/0x610 [ 1344.931673] __alloc_pages_nodemask+0x239/0x2890 [ 1344.936427] ? __lock_acquire+0x6de/0x3ff0 [ 1344.940708] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1344.945541] ? blkdev_ioctl+0x11a/0x1a80 [ 1344.949593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.954965] ? blkpg_ioctl+0x9d0/0x9d0 [ 1344.958846] ? debug_check_no_obj_freed+0x201/0x490 [ 1344.963853] ? lock_downgrade+0x720/0x720 [ 1344.968015] cache_grow_begin+0xa4/0x8a0 [ 1344.972102] ? setup_fault_attr+0x200/0x200 [ 1344.976413] ? lock_acquire+0x170/0x3c0 [ 1344.980374] cache_alloc_refill+0x273/0x340 [ 1344.984687] kmem_cache_alloc+0x346/0x370 [ 1344.988833] getname_flags+0xce/0x590 [ 1344.992624] do_mkdirat+0x8d/0x2d0 [ 1344.996162] ? __ia32_sys_mknod+0x120/0x120 [ 1345.000477] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1345.005827] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1345.010841] ? do_syscall_64+0x21/0x620 [ 1345.014803] do_syscall_64+0xf9/0x620 [ 1345.018604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.023779] RIP: 0033:0x465707 [ 1345.026958] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1345.045854] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1345.053549] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1345.060808] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1345.068072] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff 09:51:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1345.075325] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1345.082577] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000100)="f3260f08640f01c3baa000b054ee660f388077b80f00593cbad00466b80038000066ef362e0f7eb5fe580f4a71030f01c90f005b00", 0x35}], 0x1, 0x12, &(0x7f00000001c0)=[@efer={0x2, 0x5001}, @flags={0x3, 0x4}], 0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020038f0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000100000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:21 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1345.342169] FAULT_INJECTION: forcing a failure. [ 1345.342169] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.357775] CPU: 1 PID: 31920 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1345.365672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.375025] Call Trace: [ 1345.377611] dump_stack+0x1fc/0x2ef [ 1345.381243] should_fail.cold+0xa/0xf [ 1345.385042] ? setup_fault_attr+0x200/0x200 [ 1345.389351] ? __lock_acquire+0x6de/0x3ff0 [ 1345.393580] __should_failslab+0x115/0x180 [ 1345.397809] should_failslab+0x5/0x10 [ 1345.401611] __kmalloc+0x2ab/0x3c0 [ 1345.405137] ? ext4_find_extent+0x9bb/0xc70 [ 1345.409461] ext4_find_extent+0x9bb/0xc70 [ 1345.413605] ext4_ext_map_blocks+0x1c0/0x7390 [ 1345.418153] ? __lock_acquire+0x6de/0x3ff0 [ 1345.422382] ? __lock_acquire+0x6de/0x3ff0 [ 1345.426611] ? mark_held_locks+0xf0/0xf0 [ 1345.430677] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1345.436034] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1345.441208] ? mark_held_locks+0xf0/0xf0 [ 1345.445276] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1345.450115] ? ext4_es_lookup_extent+0x375/0xb60 [ 1345.454865] ? lock_downgrade+0x720/0x720 [ 1345.458999] ? lock_acquire+0x170/0x3c0 [ 1345.462987] ? check_preemption_disabled+0x41/0x280 [ 1345.468085] ? lock_acquire+0x170/0x3c0 [ 1345.472220] ? ext4_map_blocks+0x33e/0x1a50 [ 1345.476538] ext4_map_blocks+0xd88/0x1a50 [ 1345.481979] ? check_preemption_disabled+0x41/0x280 [ 1345.487004] ? ext4_issue_zeroout+0x160/0x160 [ 1345.491494] ? __brelse+0x84/0xa0 [ 1345.494938] ? __ext4_new_inode+0x2eb/0x5a20 [ 1345.499344] ext4_getblk+0xad/0x4f0 [ 1345.502990] ? ext4_iomap_begin+0xe00/0xe00 [ 1345.507307] ? ext4_free_inode+0x1780/0x1780 [ 1345.511711] ? debug_check_no_obj_freed+0x201/0x490 [ 1345.516716] ? __dquot_initialize+0x298/0xb70 [ 1345.521202] ext4_bread+0x7c/0x210 [ 1345.524734] ? ext4_getblk+0x4f0/0x4f0 [ 1345.528616] ? dquot_initialize_needed+0x290/0x290 [ 1345.533537] ? trace_hardirqs_off+0x64/0x200 [ 1345.537937] ext4_append+0x155/0x370 [ 1345.541647] ext4_mkdir+0x5bd/0xe10 [ 1345.545283] ? ext4_init_dot_dotdot+0x600/0x600 [ 1345.549947] ? generic_permission+0x116/0x4d0 [ 1345.554438] ? inode_permission.part.0+0x10c/0x450 [ 1345.559359] vfs_mkdir+0x508/0x7a0 [ 1345.562889] do_mkdirat+0x262/0x2d0 [ 1345.566507] ? __ia32_sys_mknod+0x120/0x120 [ 1345.570822] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1345.575839] ? do_syscall_64+0x21/0x620 [ 1345.579801] do_syscall_64+0xf9/0x620 [ 1345.583596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.588786] RIP: 0033:0x465707 [ 1345.591995] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1345.610885] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1345.618580] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1345.625837] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1345.633179] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1345.640435] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1345.647863] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1345.670007] ISOFS: unable to read i-node block [ 1345.679255] isofs_fill_super: get root inode failed [ 1345.750663] BTRFS warning (device ): duplicate device /dev/loop0 devid 0 generation 0 scanned by syz-executor.0 (31920) 09:51:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x1ad942, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r3, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r3, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) mmap(&(0x7f0000014000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r3, 0x7f9cf000) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000300000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003900020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8523000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:23 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x11, 0xd6, 0x0, 0x80, 0x0, 0x3, 0x3, 0x8c, 0x40, 0x36f, 0x64c, 0x9, 0x38, 0x1, 0x2, 0x3, 0x4}, [{0x7, 0x5, 0x200, 0x3e0d, 0x67e, 0x3, 0xc9a, 0x3}, {0x4, 0x4, 0x3ff, 0xd, 0x3, 0xd1, 0x1ff, 0x800}], "42717b1464715737cbea68ff7e8011bc8424e6f019cc3554384f3385facdb7313c8da2797ddf121744ca0486399ce0f6eedeb6ac3cf6ae0f866fdbfc48ecdcd340d1c091701fae37275add55fb68ec36de8b542b2a299554802b6b", ['\x00', '\x00', '\x00', '\x00']}, 0x50b) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_NMI(r2, 0xae9a) r3 = signalfd4(r2, &(0x7f0000000100)={[0x6]}, 0x8, 0x80000) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1347.886099] ISOFS: unable to read i-node block [ 1347.891442] isofs_fill_super: get root inode failed [ 1347.906692] FAULT_INJECTION: forcing a failure. [ 1347.906692] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.943946] CPU: 0 PID: 31960 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1347.952034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.961378] Call Trace: [ 1347.963956] dump_stack+0x1fc/0x2ef [ 1347.967604] should_fail.cold+0xa/0xf [ 1347.971417] ? setup_fault_attr+0x200/0x200 [ 1347.975746] ? lock_downgrade+0x720/0x720 [ 1347.979969] __should_failslab+0x115/0x180 [ 1347.984217] should_failslab+0x5/0x10 [ 1347.988009] __kmalloc+0x2ab/0x3c0 [ 1347.991533] ? ext4_find_extent+0x9bb/0xc70 [ 1347.995850] ext4_find_extent+0x9bb/0xc70 [ 1347.999995] ext4_ext_map_blocks+0x1c0/0x7390 [ 1348.004479] ? __lock_acquire+0x6de/0x3ff0 [ 1348.008885] ? mark_held_locks+0xf0/0xf0 [ 1348.013219] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 1348.018582] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 1348.023770] ? mark_held_locks+0xf0/0xf0 [ 1348.027841] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 1348.032669] ? ext4_es_lookup_extent+0x375/0xb60 [ 1348.037421] ? ext4_map_blocks+0x59f/0x1a50 [ 1348.041736] ? lock_acquire+0x170/0x3c0 [ 1348.045784] ? ext4_map_blocks+0x740/0x1a50 [ 1348.050108] ext4_map_blocks+0x7a2/0x1a50 [ 1348.054257] ? check_preemption_disabled+0x41/0x280 [ 1348.059355] ? ext4_issue_zeroout+0x160/0x160 [ 1348.063836] ? __brelse+0x84/0xa0 [ 1348.067271] ? __ext4_new_inode+0x2eb/0x5a20 [ 1348.071669] ext4_getblk+0xad/0x4f0 [ 1348.075294] ? ext4_iomap_begin+0xe00/0xe00 [ 1348.079613] ? ext4_free_inode+0x1780/0x1780 [ 1348.084006] ? debug_check_no_obj_freed+0x201/0x490 [ 1348.089008] ? __dquot_initialize+0x298/0xb70 [ 1348.093634] ext4_bread+0x7c/0x210 [ 1348.097183] ? ext4_getblk+0x4f0/0x4f0 [ 1348.101087] ? dquot_initialize_needed+0x290/0x290 [ 1348.106008] ? trace_hardirqs_off+0x64/0x200 [ 1348.110535] ext4_append+0x155/0x370 [ 1348.114265] ext4_mkdir+0x5bd/0xe10 [ 1348.117899] ? ext4_init_dot_dotdot+0x600/0x600 [ 1348.122578] ? generic_permission+0x116/0x4d0 [ 1348.127079] ? inode_permission.part.0+0x10c/0x450 [ 1348.132014] vfs_mkdir+0x508/0x7a0 [ 1348.135558] do_mkdirat+0x262/0x2d0 [ 1348.139189] ? __ia32_sys_mknod+0x120/0x120 [ 1348.143498] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1348.148503] ? do_syscall_64+0x21/0x620 [ 1348.152471] do_syscall_64+0xf9/0x620 [ 1348.156281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.161471] RIP: 0033:0x465707 [ 1348.164711] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1348.183637] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 09:51:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000600000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1348.191340] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1348.198608] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1348.205877] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1348.213137] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1348.220395] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:24 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/dvb_usb_au6610', 0x8042, 0x6) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="0f20d86635200000000f22d80f791c0f01cb812e00003bb00f0966b9ad0a000066b80000010066ba000000000f3066b91f08000066b80000010066ba000000000f30660f388013bad10466edb81e000f00d0", 0x52}], 0x1, 0x2, &(0x7f0000000280)=[@cr4={0x1, 0x40100}], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x2, 0x0, 0xf000, 0x1000, &(0x7f0000003000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x3, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 09:51:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003910020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8550000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1348.438849] FAULT_INJECTION: forcing a failure. [ 1348.438849] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.450329] CPU: 1 PID: 31998 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1348.458242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.467597] Call Trace: [ 1348.470194] dump_stack+0x1fc/0x2ef [ 1348.474574] should_fail.cold+0xa/0xf [ 1348.478389] ? setup_fault_attr+0x200/0x200 [ 1348.482720] ? __es_tree_search.isra.0+0x1af/0x210 [ 1348.487713] __should_failslab+0x115/0x180 [ 1348.491964] should_failslab+0x5/0x10 [ 1348.495782] kmem_cache_alloc+0x3f/0x370 [ 1348.499851] __es_insert_extent+0x39b/0x13b0 [ 1348.504267] ext4_es_insert_extent+0x22e/0x5e0 [ 1348.508846] ? ext4_map_blocks+0x59f/0x1a50 [ 1348.513160] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 1348.518960] ext4_map_blocks+0xa2a/0x1a50 [ 1348.523104] ? ext4_issue_zeroout+0x160/0x160 [ 1348.527592] ? __brelse+0x84/0xa0 [ 1348.531035] ? __ext4_new_inode+0x2eb/0x5a20 [ 1348.535458] ext4_getblk+0xad/0x4f0 [ 1348.539075] ? ext4_iomap_begin+0xe00/0xe00 [ 1348.543389] ? ext4_free_inode+0x1780/0x1780 [ 1348.547871] ? debug_check_no_obj_freed+0x201/0x490 [ 1348.552881] ? __dquot_initialize+0x298/0xb70 [ 1348.557372] ext4_bread+0x7c/0x210 [ 1348.561012] ? ext4_getblk+0x4f0/0x4f0 [ 1348.564896] ? dquot_initialize_needed+0x290/0x290 [ 1348.569991] ? trace_hardirqs_off+0x64/0x200 [ 1348.574393] ext4_append+0x155/0x370 [ 1348.578113] ext4_mkdir+0x5bd/0xe10 [ 1348.581736] ? ext4_init_dot_dotdot+0x600/0x600 [ 1348.586404] ? generic_permission+0x116/0x4d0 [ 1348.590895] ? inode_permission.part.0+0x10c/0x450 [ 1348.595818] vfs_mkdir+0x508/0x7a0 [ 1348.599354] do_mkdirat+0x262/0x2d0 [ 1348.602972] ? __ia32_sys_mknod+0x120/0x120 [ 1348.607285] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1348.612291] ? do_syscall_64+0x21/0x620 [ 1348.616273] do_syscall_64+0xf9/0x620 [ 1348.620067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.625254] RIP: 0033:0x465707 [ 1348.628438] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1348.647324] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1348.655018] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 1348.662291] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1348.670072] RBP: 00007f4b78910040 R08: 0000000000000000 R09: ffffffffffffffff [ 1348.677332] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1348.684784] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000700000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8560000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @ioapic={0x4000, 0x1f, 0xf53, 0x8000, 0x0, [{0x81, 0x9, 0x6, '\x00', 0x1}, {0x8, 0x81, 0x5, '\x00', 0xe3}, {0x3, 0x9, 0x5f, '\x00', 0x6}, {0x1f, 0x1, 0x0, '\x00', 0x3f}, {0x3, 0x4, 0x1f, '\x00', 0x4}, {0x42, 0x7, 0x8, '\x00', 0xf8}, {0x0, 0x3f, 0x40, '\x00', 0x81}, {0x2, 0x80, 0x10, '\x00', 0xfa}, {0x40, 0x5, 0x79, '\x00', 0xea}, {0x81, 0x1, 0x0, '\x00', 0x5}, {0x2, 0x8, 0x42, '\x00', 0xb7}, {0x80, 0x2, 0x40, '\x00', 0x3}, {0x3, 0x3f, 0x8, '\x00', 0x81}, {0x40, 0x3f, 0x57, '\x00', 0x1}, {0x1, 0x0, 0x8, '\x00', 0x84}, {0x8f, 0x7, 0x80, '\x00', 0x4}, {0xfc, 0x57, 0x9, '\x00', 0x5d}, {0x2, 0x2, 0x1, '\x00', 0x2}, {0x6, 0xbb, 0x7, '\x00', 0x6}, {0x0, 0x9, 0x8, '\x00', 0x20}, {0x6, 0x7, 0x40}, {0xff, 0xff, 0x6, '\x00', 0x1}, {0x7f, 0x1f, 0x0, '\x00', 0x1}, {0x3f, 0x8, 0xb0, '\x00', 0x2}]}}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000001c0)={[0x3ff, 0x7, 0xb4, 0x3fffc000000000, 0x1ff, 0x7a, 0x3, 0x100000000, 0x3, 0xfffffffffffffff9, 0x1000, 0x73fd, 0x7ff, 0x7, 0x4, 0xffffffffffffffc0], 0x6000, 0x4081}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003920020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:26 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1350.930537] ISOFS: unable to read i-node block 09:51:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8564000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1350.952177] isofs_fill_super: get root inode failed [ 1351.001061] FAULT_INJECTION: forcing a failure. [ 1351.001061] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.032563] CPU: 1 PID: 32052 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1351.040741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.050183] Call Trace: [ 1351.052787] dump_stack+0x1fc/0x2ef [ 1351.056430] should_fail.cold+0xa/0xf [ 1351.060250] ? setup_fault_attr+0x200/0x200 [ 1351.064622] ? lock_acquire+0x170/0x3c0 [ 1351.068802] __should_failslab+0x115/0x180 [ 1351.073054] should_failslab+0x5/0x10 [ 1351.076869] __kmalloc_track_caller+0x2a6/0x3c0 [ 1351.081543] ? strndup_user+0x70/0x120 [ 1351.085436] memdup_user+0x22/0xb0 [ 1351.088984] strndup_user+0x70/0x120 [ 1351.092711] ksys_mount+0x34/0x130 [ 1351.097559] __x64_sys_mount+0xba/0x150 [ 1351.101542] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1351.106136] do_syscall_64+0xf9/0x620 [ 1351.109953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1351.115232] RIP: 0033:0x467b1a [ 1351.118426] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.137416] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1351.145151] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1351.152514] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1351.159785] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1351.167055] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1351.174328] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003930020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8570000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1351.358112] ISOFS: unable to read i-node block [ 1351.377504] isofs_fill_super: get root inode failed 09:51:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003940020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:29 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000401602000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ba000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x1, 0x5000, 0x1000, &(0x7f0000005000/0x1000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x40, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000200)="0f72d5b4baf80c66b86796be8d66efbafc0cb000eebaf80c66b82b20638366efbafc0cec66b8000000000f23c80f21f866350000a0000f23f82e640f6762d66665f30f090f407de5f0814cdc9cce0f4feef3a7", 0x53}], 0x1, 0x40, &(0x7f0000000300), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000007704000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1354.001962] ISOFS: unable to read i-node block [ 1354.018413] isofs_fill_super: get root inode failed [ 1354.030619] FAULT_INJECTION: forcing a failure. [ 1354.030619] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.079046] CPU: 0 PID: 32133 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1354.087138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.096580] Call Trace: [ 1354.099166] dump_stack+0x1fc/0x2ef [ 1354.102787] should_fail.cold+0xa/0xf [ 1354.106587] ? setup_fault_attr+0x200/0x200 [ 1354.110986] ? lock_acquire+0x170/0x3c0 [ 1354.114956] __should_failslab+0x115/0x180 [ 1354.119268] should_failslab+0x5/0x10 [ 1354.123083] __kmalloc_track_caller+0x2a6/0x3c0 [ 1354.127749] ? strndup_user+0x70/0x120 [ 1354.131631] ? _copy_from_user+0xd2/0x130 [ 1354.135776] memdup_user+0x22/0xb0 [ 1354.139313] strndup_user+0x70/0x120 [ 1354.143026] ksys_mount+0x6f/0x130 [ 1354.146648] __x64_sys_mount+0xba/0x150 [ 1354.150708] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1354.155281] do_syscall_64+0xf9/0x620 [ 1354.159091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1354.164281] RIP: 0033:0x467b1a [ 1354.167473] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1354.186447] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1354.194146] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1354.201410] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1354.208667] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1354.215938] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1354.223731] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:30 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f0000000100)) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) 09:51:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003950020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1354.349519] FAULT_INJECTION: forcing a failure. [ 1354.349519] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.391083] CPU: 1 PID: 32162 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1354.399040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.408567] Call Trace: [ 1354.411167] dump_stack+0x1fc/0x2ef [ 1354.414801] should_fail.cold+0xa/0xf [ 1354.418593] ? setup_fault_attr+0x200/0x200 [ 1354.422906] ? lock_acquire+0x170/0x3c0 [ 1354.427050] __should_failslab+0x115/0x180 [ 1354.431273] should_failslab+0x5/0x10 [ 1354.435061] __kmalloc_track_caller+0x2a6/0x3c0 [ 1354.439729] ? strndup_user+0x70/0x120 [ 1354.443613] ? _copy_from_user+0xd2/0x130 [ 1354.447752] memdup_user+0x22/0xb0 [ 1354.451284] strndup_user+0x70/0x120 [ 1354.455339] ksys_mount+0x6f/0x130 [ 1354.458871] __x64_sys_mount+0xba/0x150 [ 1354.462836] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1354.467409] do_syscall_64+0xf9/0x620 [ 1354.471722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1354.476907] RIP: 0033:0x467b1a [ 1354.480276] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1354.499366] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1354.507060] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1354.514315] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1354.521574] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1354.528827] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 09:51:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1354.536082] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f4000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003960020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:32 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fb000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000002000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000100)="b9460200000f320fc7ae0d000000da8b0500000066ba4100b80d000000ef66baf80cb85e79ce8aef66bafc0c66ed0f01c43ec19cab005800001f66b8fa008ed8992e67f30f700582", 0x48}], 0x1, 0x42, &(0x7f0000000200)=[@dstype0={0x6, 0x1}, @cstype3={0x5, 0x5}], 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1357.044103] FAULT_INJECTION: forcing a failure. [ 1357.044103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1357.055939] CPU: 0 PID: 32214 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1357.063824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.073174] Call Trace: [ 1357.075761] dump_stack+0x1fc/0x2ef [ 1357.079387] should_fail.cold+0xa/0xf [ 1357.083182] ? setup_fault_attr+0x200/0x200 [ 1357.087490] ? is_bpf_text_address+0xfc/0x1b0 [ 1357.091983] ? kernel_text_address+0xbd/0xf0 [ 1357.096380] ? __kernel_text_address+0x9/0x30 [ 1357.100871] __alloc_pages_nodemask+0x239/0x2890 [ 1357.105626] ? __lock_acquire+0x6de/0x3ff0 [ 1357.109856] ? __x64_sys_mount+0xba/0x150 [ 1357.114037] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1357.118870] ? ext4_mkdir+0x82b/0xe10 [ 1357.122749] ? mark_held_locks+0xf0/0xf0 [ 1357.126807] ? mark_held_locks+0xf0/0xf0 [ 1357.130859] ? list_lru_add+0x292/0x600 [ 1357.134827] ? mntput_no_expire+0xf2/0xa30 [ 1357.139070] cache_grow_begin+0xa4/0x8a0 [ 1357.143129] ? setup_fault_attr+0x200/0x200 [ 1357.147437] ? lock_acquire+0x170/0x3c0 [ 1357.151579] cache_alloc_refill+0x273/0x340 [ 1357.155893] kmem_cache_alloc_trace+0x354/0x380 [ 1357.160552] copy_mount_options+0x59/0x380 [ 1357.164778] ksys_mount+0x9b/0x130 [ 1357.168312] __x64_sys_mount+0xba/0x150 [ 1357.172278] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1357.176869] do_syscall_64+0xf9/0x620 [ 1357.180661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.185841] RIP: 0033:0x467b1a [ 1357.189034] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1357.207934] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1357.215637] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1357.222904] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1357.230173] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1357.237428] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 09:51:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000010000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1357.244684] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1357.269450] ptrace attach of "/root/syz-executor.1"[32226] was attempted by "/root/syz-executor.1"[32229] 09:51:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:33 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850d010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1357.468091] FAULT_INJECTION: forcing a failure. [ 1357.468091] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.502398] CPU: 0 PID: 32257 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1357.510309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.519664] Call Trace: [ 1357.522249] dump_stack+0x1fc/0x2ef [ 1357.525881] should_fail.cold+0xa/0xf [ 1357.529676] ? setup_fault_attr+0x200/0x200 [ 1357.533987] ? lock_acquire+0x170/0x3c0 [ 1357.537956] __should_failslab+0x115/0x180 [ 1357.542180] should_failslab+0x5/0x10 [ 1357.545967] kmem_cache_alloc+0x277/0x370 [ 1357.550105] getname_flags+0xce/0x590 [ 1357.553895] user_path_at_empty+0x2a/0x50 [ 1357.558036] do_mount+0x147/0x2f50 [ 1357.561567] ? cmp_ex_sort+0xc0/0xc0 [ 1357.565269] ? __do_page_fault+0x180/0xd60 [ 1357.569492] ? copy_mount_string+0x40/0x40 [ 1357.573721] ? memset+0x20/0x40 [ 1357.576989] ? copy_mount_options+0x26f/0x380 [ 1357.581474] ksys_mount+0xcf/0x130 [ 1357.585006] __x64_sys_mount+0xba/0x150 [ 1357.588974] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1357.593629] do_syscall_64+0xf9/0x620 [ 1357.597423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.602597] RIP: 0033:0x467b1a [ 1357.605782] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1357.624678] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1357.632384] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1357.639645] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1357.646900] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1357.654156] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1357.661412] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003970020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000001c0)={0x10000, 0xff2c}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x210080) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FITHAW(r2, 0xc0045878) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:33 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1357.796377] ISOFS: unable to read i-node block [ 1357.822863] FAULT_INJECTION: forcing a failure. [ 1357.822863] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.840636] isofs_fill_super: get root inode failed [ 1357.878054] CPU: 0 PID: 32287 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1357.886000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.895359] Call Trace: [ 1357.897954] dump_stack+0x1fc/0x2ef [ 1357.901592] should_fail.cold+0xa/0xf [ 1357.905395] ? setup_fault_attr+0x200/0x200 [ 1357.909707] ? lock_acquire+0x170/0x3c0 [ 1357.913686] __should_failslab+0x115/0x180 [ 1357.917920] should_failslab+0x5/0x10 [ 1357.921710] __kmalloc_track_caller+0x2a6/0x3c0 [ 1357.926379] ? btrfs_mount+0xb5/0xaa0 [ 1357.930267] kstrdup+0x36/0x70 [ 1357.933458] btrfs_mount+0xb5/0xaa0 [ 1357.937091] ? btrfs_show_options+0xfd0/0xfd0 [ 1357.941604] ? __mutex_unlock_slowpath+0xea/0x610 [ 1357.946447] ? check_preemption_disabled+0x41/0x280 [ 1357.951562] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1357.956668] ? pcpu_alloc+0xc9/0x1190 [ 1357.960458] ? __lockdep_init_map+0x100/0x5a0 [ 1357.964943] mount_fs+0xa3/0x310 [ 1357.968304] vfs_kern_mount.part.0+0x68/0x470 [ 1357.972792] do_mount+0x115c/0x2f50 [ 1357.976408] ? cmp_ex_sort+0xc0/0xc0 [ 1357.980111] ? __do_page_fault+0x180/0xd60 [ 1357.984376] ? copy_mount_string+0x40/0x40 [ 1357.988608] ? memset+0x20/0x40 [ 1357.991876] ? copy_mount_options+0x26f/0x380 [ 1357.996364] ksys_mount+0xcf/0x130 [ 1357.999895] __x64_sys_mount+0xba/0x150 [ 1358.003858] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1358.008426] do_syscall_64+0xf9/0x620 [ 1358.012217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.017391] RIP: 0033:0x467b1a [ 1358.020569] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1358.039459] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1358.047166] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1358.054422] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1358.061689] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1358.068953] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 09:51:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x6, 0x4, 0x0, 0xfff, 0x3, 0x3, 0x240c, 0x147, 0x38, 0x276, 0x6, 0x7, 0x20, 0x1, 0x9, 0x4, 0x4}, [{0x6, 0x6, 0x20, 0x7f, 0x4, 0x1, 0x80000001}, {0x5, 0xffffff81, 0x20, 0x8001, 0x1f, 0x699, 0x3, 0x7}], "f666aca7969441aefc1cf061bc8023de96d0e4ff82c75d9aad7939386b89b714918a062e291ace62a16dd735a45560999bf43393ef30d979d0e412489285ab4a37e3d7e5a294bb500cc8d4c9d7b0a072921ff4d20d498bac46a38ed37e674887c6c6d571ff5cea8fae07a0a381", ['\x00', '\x00']}, 0x2e5) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x1, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x80) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup(r3) [ 1358.076206] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:36 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003980020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8520010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x3c0, 0x20) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1360.391475] FAULT_INJECTION: forcing a failure. [ 1360.391475] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.429631] ISOFS: unable to read i-node block [ 1360.437529] isofs_fill_super: get root inode failed [ 1360.442893] CPU: 1 PID: 32341 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1360.450780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.460145] Call Trace: [ 1360.462729] dump_stack+0x1fc/0x2ef [ 1360.466362] should_fail.cold+0xa/0xf [ 1360.470153] ? setup_fault_attr+0x200/0x200 [ 1360.474466] ? lock_acquire+0x170/0x3c0 [ 1360.478436] __should_failslab+0x115/0x180 [ 1360.482673] should_failslab+0x5/0x10 [ 1360.486462] kmem_cache_alloc+0x277/0x370 [ 1360.490614] alloc_vfsmnt+0x23/0x780 [ 1360.494315] ? _raw_read_unlock+0x29/0x40 [ 1360.498460] vfs_kern_mount.part.0+0x27/0x470 [ 1360.502952] do_mount+0x115c/0x2f50 [ 1360.506568] ? cmp_ex_sort+0xc0/0xc0 [ 1360.510274] ? __do_page_fault+0x180/0xd60 [ 1360.514498] ? copy_mount_string+0x40/0x40 [ 1360.518728] ? memset+0x20/0x40 [ 1360.521997] ? copy_mount_options+0x26f/0x380 [ 1360.526482] ksys_mount+0xcf/0x130 [ 1360.530017] __x64_sys_mount+0xba/0x150 [ 1360.533981] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1360.538552] do_syscall_64+0xf9/0x620 [ 1360.542355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.547530] RIP: 0033:0x467b1a [ 1360.550712] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.569607] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1360.577298] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1360.584552] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 09:51:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1360.591894] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1360.599151] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1360.606412] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1360.632136] ptrace attach of "/root/syz-executor.1"[32363] was attempted by "/root/syz-executor.1"[32364] 09:51:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100), 0x24a240, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f00000001c0)="36670fc79b050000000f000af30f87e16e7a05660f38002bbaf80c66b89084558466efbafc0cedbaf80c66b80c19118966efbafc0c66b8339a000066ef66b9800000c00f326635000100000f3066b9760b00000f32f20f2cc8", 0x59}], 0x1, 0x30, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000140)={0x1fd, 0x2, 0xd000, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8548010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002003990020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c00)=[{&(0x7f00000007c0)=""/200, 0xc8}, {&(0x7f00000008c0)=""/157, 0x9d}, {&(0x7f0000000980)}, {&(0x7f00000009c0)=""/128, 0x80}, {&(0x7f0000000a40)=""/162, 0xa2}, {&(0x7f0000000b00)=""/219, 0xdb}], 0x6, 0xfffffff8, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x2000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x180200, 0x0) r5 = syz_mount_image$v7(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x10000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000300)="7060e01bb40faafa3801ce14be00ae1ca558e0c17b016d826e7567a408fe94c8484016e94d2a9c08a57fb20fb4010f2802cbf76f6f08e344875c15e322bcd4f0d0c66f9174150e9fab509fcb022ba8e2ebcc5fa6296f61763ba915b1bdc476863e741fac21aeb504a44d76462c6ddcd8f6894f81bfe9696a054421f74cf9d847f600aed861aecc1e5158b80e335b384ee1ff5f8460bd91c112a05415649556caf9d25557d12ba617dacfec8cf9b2da636f9c9db4b94bbab25c62652a13a3d9d16c00fb4b0fdfea532058d8cf54f3a1509ea80d3e2f362b50dfdc5b2e44afe3c149f6f13af3c9188b029c72df8c066e65aaab797c41baca21533db0b0dfe3", 0xfe, 0x4}], 0x81000, &(0x7f0000000400)={[{'-'}, {}, {}, {'/dev/kvm\x00'}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}, {')!'}, {'/dev/kvm\x00'}, {'/dev/dlm-control\x00'}, {'::&/\x9e.)^@&'}], [{@uid_lt={'uid<', 0xee01}}]}) preadv(r5, &(0x7f0000000280)=[{&(0x7f0000000480)=""/232, 0xe8}, {&(0x7f0000000580)=""/233, 0xe9}, {&(0x7f0000000680)=""/208, 0xd0}], 0x3, 0x9, 0x3) ioctl$KVM_SET_SIGNAL_MASK(r4, 0x4004ae8b, &(0x7f0000000140)={0x1a, "a2ecfa5969903dae521dda6339f3bafc2e3a5e1ef55dff640f0b"}) [ 1360.859199] FAULT_INJECTION: forcing a failure. [ 1360.859199] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.871598] CPU: 0 PID: 32398 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1360.879495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.888861] Call Trace: [ 1360.891452] dump_stack+0x1fc/0x2ef [ 1360.895082] should_fail.cold+0xa/0xf [ 1360.898896] ? setup_fault_attr+0x200/0x200 [ 1360.903208] ? lock_acquire+0x170/0x3c0 [ 1360.907178] __should_failslab+0x115/0x180 [ 1360.911432] should_failslab+0x5/0x10 [ 1360.915234] kmem_cache_alloc+0x277/0x370 [ 1360.919373] alloc_vfsmnt+0x23/0x780 [ 1360.923075] vfs_kern_mount.part.0+0x27/0x470 [ 1360.927559] ? kfree+0x110/0x210 [ 1360.930915] vfs_kern_mount+0x3c/0x60 [ 1360.934712] btrfs_mount+0x23a/0xaa0 [ 1360.938416] ? btrfs_show_options+0xfd0/0xfd0 [ 1360.942910] ? __mutex_unlock_slowpath+0xea/0x610 [ 1360.947743] ? check_preemption_disabled+0x41/0x280 [ 1360.952764] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1360.957768] ? pcpu_alloc+0xc9/0x1190 [ 1360.961557] ? __lockdep_init_map+0x100/0x5a0 [ 1360.966046] mount_fs+0xa3/0x310 [ 1360.969423] vfs_kern_mount.part.0+0x68/0x470 [ 1360.973920] do_mount+0x115c/0x2f50 [ 1360.977537] ? cmp_ex_sort+0xc0/0xc0 [ 1360.981252] ? __do_page_fault+0x180/0xd60 [ 1360.985476] ? copy_mount_string+0x40/0x40 [ 1360.989704] ? memset+0x20/0x40 [ 1360.992974] ? copy_mount_options+0x26f/0x380 [ 1360.997635] ksys_mount+0xcf/0x130 [ 1361.001164] __x64_sys_mount+0xba/0x150 [ 1361.005129] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1361.009700] do_syscall_64+0xf9/0x620 [ 1361.013498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.018676] RIP: 0033:0x467b1a [ 1361.021866] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1361.040755] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1361.048453] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1361.055719] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1361.063148] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1361.070418] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1361.077674] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85aa010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:37 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1361.175708] ISOFS: unable to read i-node block [ 1361.185009] isofs_fill_super: get root inode failed 09:51:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r3, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r3, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) mmap(&(0x7f0000015000/0x1000)=nil, 0x1000, 0x2000001, 0x80010, r3, 0x7f48b000) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020039a0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1361.311983] FAULT_INJECTION: forcing a failure. [ 1361.311983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1361.358020] CPU: 0 PID: 32438 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1361.365929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.375310] Call Trace: [ 1361.377896] dump_stack+0x1fc/0x2ef [ 1361.381518] should_fail.cold+0xa/0xf [ 1361.385309] ? lock_acquire+0x170/0x3c0 [ 1361.389272] ? setup_fault_attr+0x200/0x200 [ 1361.393598] __alloc_pages_nodemask+0x239/0x2890 [ 1361.398345] ? __lock_acquire+0x6de/0x3ff0 [ 1361.402592] ? kernel_text_address+0xbd/0xf0 [ 1361.406988] ? mark_held_locks+0xf0/0xf0 [ 1361.411040] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1361.416044] ? __save_stack_trace+0xaf/0x190 [ 1361.420449] ? __lock_acquire+0x6de/0x3ff0 [ 1361.424700] alloc_pages_current+0x193/0x2a0 [ 1361.429100] get_zeroed_page+0x10/0x40 [ 1361.432991] parse_security_options.constprop.0+0x1a/0xa0 [ 1361.438534] btrfs_mount_root+0x110/0x1830 [ 1361.442766] ? btrfs_decode_error+0x70/0x70 [ 1361.447078] ? __mutex_unlock_slowpath+0xea/0x610 [ 1361.451910] ? check_preemption_disabled+0x41/0x280 [ 1361.456923] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1361.461928] ? pcpu_alloc+0xc9/0x1190 [ 1361.465721] ? __lockdep_init_map+0x100/0x5a0 [ 1361.470295] mount_fs+0xa3/0x310 [ 1361.473739] vfs_kern_mount.part.0+0x68/0x470 [ 1361.478222] ? kfree+0x110/0x210 [ 1361.481582] vfs_kern_mount+0x3c/0x60 [ 1361.485376] btrfs_mount+0x23a/0xaa0 [ 1361.489080] ? btrfs_show_options+0xfd0/0xfd0 [ 1361.493563] ? __mutex_unlock_slowpath+0xea/0x610 [ 1361.498397] ? check_preemption_disabled+0x41/0x280 [ 1361.503405] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1361.508409] ? pcpu_alloc+0xc9/0x1190 [ 1361.512200] ? __lockdep_init_map+0x100/0x5a0 [ 1361.516689] mount_fs+0xa3/0x310 [ 1361.520047] vfs_kern_mount.part.0+0x68/0x470 [ 1361.524533] do_mount+0x115c/0x2f50 [ 1361.528159] ? cmp_ex_sort+0xc0/0xc0 [ 1361.531871] ? __do_page_fault+0x180/0xd60 [ 1361.536096] ? copy_mount_string+0x40/0x40 [ 1361.540325] ? memset+0x20/0x40 [ 1361.543592] ? copy_mount_options+0x26f/0x380 [ 1361.548082] ksys_mount+0xcf/0x130 [ 1361.551613] __x64_sys_mount+0xba/0x150 [ 1361.555588] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1361.560166] do_syscall_64+0xf9/0x620 [ 1361.563962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.569138] RIP: 0033:0x467b1a [ 1361.572318] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1361.591204] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1361.598900] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1361.606156] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1361.613601] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1361.620859] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1361.628117] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1361.686353] ISOFS: unable to read i-node block [ 1361.691644] isofs_fill_super: get root inode failed [ 1362.824047] ieee802154 phy0 wpan0: encryption failed: -22 [ 1362.829699] ieee802154 phy1 wpan1: encryption failed: -22 09:51:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r6, r2, &(0x7f000000a000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000100)="40d9eb260f20160f20c035080000000f22c0b9290b00000f3266ba4300b8f64e0000ef48b800800000000000000f23c80f21f8350c0020000f23f80f20e035000010000f22e0c7442400c4000000c744240200000100ff1c2442dbe4652636f30f38f6ee", 0x64}], 0x1, 0x40, &(0x7f0000000200)=[@flags], 0x1) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000240)={0x10004, 0x3, 0x4, 0x1000, &(0x7f0000b01000/0x1000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:39 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85c1010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020039b0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1363.790617] FAULT_INJECTION: forcing a failure. [ 1363.790617] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.829382] ISOFS: unable to read i-node block [ 1363.845303] isofs_fill_super: get root inode failed [ 1363.859691] CPU: 0 PID: 32488 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1363.867613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.876970] Call Trace: [ 1363.879569] dump_stack+0x1fc/0x2ef [ 1363.883215] should_fail.cold+0xa/0xf [ 1363.887027] ? setup_fault_attr+0x200/0x200 [ 1363.891440] ? lock_acquire+0x170/0x3c0 [ 1363.895442] __should_failslab+0x115/0x180 [ 1363.899688] should_failslab+0x5/0x10 [ 1363.903494] __kmalloc_track_caller+0x2a6/0x3c0 [ 1363.908171] ? btrfs_mount+0xb5/0xaa0 [ 1363.911984] kstrdup+0x36/0x70 [ 1363.915188] btrfs_mount+0xb5/0xaa0 [ 1363.918828] ? btrfs_show_options+0xfd0/0xfd0 [ 1363.923328] ? __mutex_unlock_slowpath+0xea/0x610 [ 1363.928184] ? check_preemption_disabled+0x41/0x280 [ 1363.933218] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1363.938239] ? pcpu_alloc+0xc9/0x1190 [ 1363.942052] ? __lockdep_init_map+0x100/0x5a0 [ 1363.946644] mount_fs+0xa3/0x310 [ 1363.950285] vfs_kern_mount.part.0+0x68/0x470 [ 1363.954789] do_mount+0x115c/0x2f50 [ 1363.958410] ? cmp_ex_sort+0xc0/0xc0 [ 1363.962115] ? __do_page_fault+0x180/0xd60 [ 1363.966426] ? copy_mount_string+0x40/0x40 [ 1363.970654] ? memset+0x20/0x40 [ 1363.973923] ? copy_mount_options+0x26f/0x380 [ 1363.978409] ksys_mount+0xcf/0x130 [ 1363.981938] __x64_sys_mount+0xba/0x150 [ 1363.985902] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1363.990471] do_syscall_64+0xf9/0x620 [ 1363.994266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.999442] RIP: 0033:0x467b1a [ 1364.002631] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.021623] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1364.029327] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1364.036582] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 09:51:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ca010000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1364.043839] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1364.051104] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1364.058355] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x101ff, 0x2, 0xe004, 0x2000, &(0x7f0000011000/0x2000)=nil}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x6000, 0x1e000}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x42402, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000002380)={0x1, 0x0, @pic={0x8, 0xff, 0x8, 0x81, 0x6, 0x1, 0x1, 0x7f, 0x66, 0x1, 0xfe, 0x0, 0x1, 0x5b, 0x9, 0xc5}}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000005000/0x2000)=nil, 0x2000, 0xc, 0x20010, 0xffffffffffffffff, 0xdd5d9000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) ioctl$KVM_SET_NESTED_STATE(r4, 0x4080aebf, &(0x7f0000000300)={{0x2, 0x0, 0x80, {0x10000, 0x19002, 0x1}}, "9c63d4101c790af00bea1ebf9318b4ece88ad91b26540ef73ae04dc373452673c7a5d54ac809ec0ac57eedaebff85ef253f16434e004d013075509a95e3c568d7d36d9364efee99f6d1444c32ab0c24800c1cdace6601909719eedc2c7cb6967bdaae6333d4faecc4caea3ff4320c39a1ec1a3fe57ac426940e01d1f7720d1bf315ff2208b68a1c39553e67ef7990472092b95a68f57f38a172056bafad193cc8b00dbd2a73d835aca5d782a51f2640a16a80be4a63ba46bc3d30ce8aca3c1e26b41c9f461572c679bbb24856f5a4ed04a4454ed25b398006e1fc2c87dfbac73470e45f32a544566b8e3a468a64bf13e4870d63011ab0d977fe981613955494506463fbcb468ada94b11ea96c2243736a14af4a0f03565ed88eb722a9cd5c5d6a68c7455029790a660082d26ff35ba3ec32f197d5350310542e74fb6beb82511260a068f5f9d9359ac379153ebffe7b7a3145e35b9498d1d4af8e27edc1a6fd5fcedec888fe41db809a14310a8fec7e1057868b9d5f17ba8c2e29838f3a0166911b28f398d39eb6ae8ab617b75e42a21fd3b016cc05263b9ac2474fd57bcc233221efa9e5d6e15c590950a530a524e4f07b4d7198b42b83af280a43c6f64519c2a81729a818bebf58a16ef748fa6edcb9c1b349e293d6ab7a4095410258817d2adf03110ddd07387d79cfc00e06d795624ada986182e5397bd4d5ea2794c038d60fc90f88941c60bd3bc1c83932f102081b3300cc3307f000dbc1c1457638b0e838b1443a9b7cb7c15fe868b1478b9ef6ed0cab1720895a3a818c75c021a9dfc040d86c303ecacfa13c09fe86106f3dd577303fb36d977f89cf3e07a509cdb841a77257bafc43a980769b8769791065860d60912dc9edc58995665b655cf728f87dbc331c2c1fc4026af9058315292695a76e7703e5d4df2bff254c0b7cc71a757d7724f6aa9f2d0cdf0e79fae1904c3f4efcae1ff777786647e58d11f74ba0cf9ede715693a0e04e8957fe85c32fe6f5dce7fc947c3f52cd6a736679461651f2a8f3bbf06cb00ff0b8a874ba92afb21fd4396c067d05a8ba72d56f7d173390557008050c39b891df53677af95de571a366be137332ead89dfe0a4c92655127b624aa79164ef981abb31418c6fa633d553d87939f741b73a9cd8c60487c1ec01feb3c3f506b86f4e864c806ea7f358e56dda3d976e10832be49521d83eaa4cf9239630b864e483c20a878aa29e87d37cce0f1815b015b1c2847a93554b5c68ade4d42b0ba96d443c61c67c65ec0f0d36bfa0581781f3c63e2776664f115763b9736105460dd1b7f92a51453fbf9e8414bcb60d2b99f8c73dc9af6ec4b91def01b1e0775ac61d2f8028a88e00d0e756bf8562a7bc06e4e3d0e681ce7388729b1022ed070d03322eddd73823ac4bbf82625b2bfbfc116984ad237f87de086c5d1d40f8e2f42e7d96eb20b180614920c240b92e190c937cd57b9e9a72e613e67a829ba80562c31f2338a0ce54346f1420af9696e9d1cfcea73c24104166158779e1c684e956096ac88fd698d9a671001810aea73adb2459502c9ce5eff9baab81b8e2fed2c7d9351b57e80018b5084ecbceac54a3f3e9e4e4907e279be20529965707e253c2cd7c91c7c10b06a8ce044cd67daf869d143f11ed5428227f7f8a0b114345635b032eeedafec65ec7560435bb2d775d3c2084ca53ed0acb95dc9a239f8ce131bcf0d491cfa682250556c0764fd7baf353f9a375c8d78e5ee3cf4276dd9b4993697e03240a8077da00c51adbf686095d456a5025eed02cf8da78bd66da3acd7b66a5043a519d0b1e35f70d2f510c0bdae16ba504fb6979839fd6032dbc2ea0438346a180be111d82cf191256d8501b724c26b94cfadfd736e995d4344a3ed256ef9cd0ceb2c6ab5cea9011a877245c44512764f66fbc2d8faa1aaa056f102ff8fd76ad774563139484d812c6b723c33606f586bffa378cca3f0a1bca2e1854e508e381ffa0c2c0b40b8939ffe92f801c4a0385b62d9f870f8d69ba054a8a40a58c55838d983ad597ca73d76f79ec81ddd26b8759d26f209f9c72a3fd58525d30c220a347d5da78ad6a1daf17f1aea5f7e1d2a297154939d77162be6d5a2403c69cc13ddfd68f54f34bf2dd78367df360155d45414c80e7c6eb5729d44f588c4f6b17214a503f156cb779fdd1229047f9155e6c4104010ccfd853e70ee0328465a1fe9b262da3f77953872cc3b31ed55d4a6729726740e0900a41b52278c55828757f54972432028381a818378f753ace6859207df2324d8a6556ed2fe970065173cfbd5016213c8fd9cbddeabf9e2a3b8b7a4c2915dfd5faa86b529462602926fa2619be5fc98bc039542aca61c50225b4d68abd23b00427ca92021ac56e19d726b5cb148cc6782e808e82cab4f2c41bc9e6a5b0297d29ce5176f4905277be48b60787de41d387d6a8eb3e71aaacf65019a70434c6fc765ab394b4071fd40267c55e636958204fe2a575af95ea0aaaa0dbdcd22b34ffb2d372d5feefbc7ce14f63434b1f4012dfae1df08ce401c7b6c870efe175385b0bab49529c9c5e04c104e9e9ef3be78627122598c937e69a26d85e447464fdbb02db4996fd0a5ffcb23edb4d8c34f2de1be056251daca981239e93c6a54367502addfc3e0ef3715cf1a0746c94721afd51838272863f3cf44ae8bd19d3b9ba8fa4dc66ddf89a1860e1ad822dfa0b3b3262a514bbc12ae47dd3754cb372149e36ff74560e887509331bf2c284a43d83cf0defb7db3b7a3f22b36afe8bab3bd0ba5623482a94f1dbe3eac292775deb133d11aea6633cacb316aec53e3cc68115ce9dc7e0c3b56c8afe92fe349aa7a4f786b181e3ec939d369ff04c6b4b149109df2fdd4b5f7bfa1f2baf36f65e696a650a967d464a4477db3d59b3bbeb9d1d8e61b27c21c0eee5365ef779e91437b64fb00875c8f96a8e4b04fba3d68b800585215e9875e405245be961c3999c244af351af4dcd260f3488535cc89b208fd8b4d9a507387ffa6d0435d18eb5b510f5827cbde257f9103183b95506ffe1ad987427cd29d769816672c05aebe6583f015cb209f86393a1abb9eebd2c15ac9f624c1bc36de6c9de3af03da649f5a14a9646a1ba811d6f4517eb4302834be201976fd1597246a50a24ea46742639bcdcc15d0d4a30ef2615538f051f763cdfa072cae938ba19f9f89e0ddd3ca8eb58fb264ba18fd61b0b8e16318c2446d4be57cb55fbad7b13e607590c4f771701375fa158820daf6ccd2a30ece447781d9b0f93e78ed8e8f33bda97ef9a860fbb42c9dff016375a68603198922daf1020ed49fdb3c60abb0a7c0089624d6cc0013af5d925d503040e247af02e058a3c9f6cc8594aa6242222cb15cbb069a2c00be640d0eb9488c3f7c464fb35bbfe417e962a48508e280635f4966f3645be3ef0ee1d941f9b3af2c1a0a068019898b9305abc3cbd5e8d528f619d00a86b2c997aa1e0924167fb1993047587bc14db390f9ae4b1e7717fb6c02b62b773dce377f0e0551c94c055dbe5cce54618342e31400d75965102eab00ee7c02eb371b3a1a337eadca42d8e4c75db24dd1be152885b5d6c9a5d4a16e6e4a380974a4d7ee6cb79fbdb9a63eb65564f60467bc0ba75a2ac73305bafa556da00bf0513d7a6d9f07a8623d0f93d7f4c2fe78ead9d5fc44c82c4dfad8edd171e1dcdbb97252be3abc89240836447eea89d1a3729539ad70b16ccfeb855b34f64891e9a1bde3c809b08d62d63e1236b6c6743f0080a1d5eaba804ce319e10aa83e5aa9b592c34e755b64d7af95904f0009f82e27431e994ca71f3a2b67e34afd7c7c5fb52625b325654a5b08e6cac5a789e9625530433c8b9097a956be76e33998d717abd8da390ee208f672ea554d7b0d15de671c9e3e3589d78c94361ea2c45663258067320158a7f0ed2495bfa4e43af93791c719dc84d429936f7689a75155316141ac22a4729a5f4b33b17cc33552abb6cda4dd1cac9cc106bacf4d5310b61734a8defe6f4327e6ed03ea5df947def544e0b324de2b990ec510c09b4567944cef56be9454a1d48a80f813d65f823ac34ff48bc6bffa20393e83c31df5bd5aff62786a06a9b0e6bb72480c6041f1d8fba0a7e6256591caa9bbebc3cca16a647fe328b8e19d8a07587f5e568f9780bb57e3dc8093d55d59eb3004003150e6d0028e52fe0f2ebcfbf4a1978b98242d351b7f301dc9efa9e1eadf057b38ece268e69468ff6c53faff9d96629f4aa66f8fe88a635bbcf22271869e0f556ac89cb4740932b2f08d3d2753298657e54abcce6ce33f19f2c517047bccb31d6ad89b0e0b03be5490a176a2dd5db9ef2822d798bdbd229f5fb3ae10e56db24bbce8c5fb8e12f48bec4c1aa1fe9a52c01d0bafdf1a78c7fbc212601a715c0d22956ee7c3d1d08c0bfd3f119a36c917f9b5529329d21ead6be72a0a889e2065a9723499ca4437f4cc6a337789ede2e4b279635aa35f672e741160d48819c13d4261ddf20dc95cde2243c46d3a3cd6cb8f9bc16468ed5abcfea53665a64543583c2801796d8711662f3ede91d67df376487f2bdac88375239cab7fe019bbe036e2b09e7ccf2ebd2d13e5d3a03754c10d27a1efb35697e7151ac5470e8b4c80b043a9f2d4ba39ae2d36aa325d875936239f946ac294e29b4c514c4d245c618e8169a2d2b7291e220964dd182a516f74b38dd312627460603401811c421e5c240c20d261cbaeb059860cc86e95a7175858079927f5dbd9e53f82ca21d5e23e92d06162d15212f49ae00a0d2aba6107a5e1bcd77999d10b73a795d882133b3da64f919116b7d48b23cac01069c469c3d1e1d26cb787457101ecd1d906d03890a8a222058a2961e808362ce35488cb752dab9b4bb9acf742ba0002f07f5d7c0f5da756c50355b14834195153470ae0374d572e8bba4c3cbd7b9d2cef38fecb14f1c6943e2c76ca3afbef2a466c66ab9bf3eca734a267687fd6934289879e49f33084c9c91c542349c09006a85f5e66fa9ad73fdb3aae3cae062eb11c078c48c75d3664e08b4ad52335995b8ff939290df90a299dd017d2985e3fd35476fa153074ffec7ac57b4908d95fa0558c1bdfa4bec356c731e1a43923b542fefae02c4516adb2c035dc69e50c9820000749390bb4eab5bc1fafbf0633a4e2cf142f262dcab34c956277a4d4b9c838474f34e088e79577c478bf7591bdb32a73be8aa9d7762d9ecb32a31568659dd92df3a8cec2e368cf2db56933eaaff4083f536f0a17724030fa238d8ec7ceb60d420209944517476cb9683d37dfe5aff07b6dcfa9109ce6d95325748074b247f75056b2ecadf9a43ff798dfd6315960009b1ae4806cd9465e8526a030b54df8e716f6c1cb20cec0208b3d75317e06bf453d1df5a3aa52d70f4154a8254e04356d8fadedfa4c3da5b590bb43de5a46c234cb6012e50934ebcab81aaf368fc57225a6f4be4ed64d9c91dc2e1c13302de414f76407586065026d59abec2b42566a6f755c72396268a6422d92cacef5316de46d3453aab79d2e9d886348cdd11f9871faf9759eaad148966ef7e6d80518cb5954896d8114950867d980176fdf17ba8b89195591f22f8db6c6b10e8cfa97f857faf3d5e751a344cb908fc85dcedaba0122f9b476aff93f17ba93f488f27f649e8f554d473a94b8d883613cc85b9aa5b05a4fc7937b027f5380ea7af5925184210e209f5385501bb9ca210ab7de7786535513d659ae18648208221df2fac550f9566472c118d8258533e0eebd6597581", "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"}) 09:51:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:40 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020039c0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1364.308796] FAULT_INJECTION: forcing a failure. [ 1364.308796] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.341724] ISOFS: unable to read i-node block [ 1364.348463] isofs_fill_super: get root inode failed [ 1364.354724] CPU: 1 PID: 32549 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1364.362624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.371997] Call Trace: [ 1364.374585] dump_stack+0x1fc/0x2ef [ 1364.378218] should_fail.cold+0xa/0xf [ 1364.382011] ? setup_fault_attr+0x200/0x200 [ 1364.386319] ? lock_acquire+0x170/0x3c0 [ 1364.390306] __should_failslab+0x115/0x180 [ 1364.394534] should_failslab+0x5/0x10 [ 1364.398321] kmem_cache_alloc_trace+0x284/0x380 [ 1364.402980] btrfs_mount_root+0x188/0x1830 [ 1364.407227] ? btrfs_decode_error+0x70/0x70 [ 1364.411539] ? __mutex_unlock_slowpath+0xea/0x610 [ 1364.416374] ? check_preemption_disabled+0x41/0x280 [ 1364.421385] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1364.426388] ? pcpu_alloc+0xc9/0x1190 [ 1364.430181] ? __lockdep_init_map+0x100/0x5a0 [ 1364.434672] mount_fs+0xa3/0x310 [ 1364.438040] vfs_kern_mount.part.0+0x68/0x470 [ 1364.442519] ? kfree+0x110/0x210 [ 1364.445875] vfs_kern_mount+0x3c/0x60 [ 1364.449669] btrfs_mount+0x23a/0xaa0 [ 1364.453375] ? btrfs_show_options+0xfd0/0xfd0 [ 1364.457874] ? __mutex_unlock_slowpath+0xea/0x610 [ 1364.462710] ? check_preemption_disabled+0x41/0x280 [ 1364.467719] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1364.472723] ? pcpu_alloc+0xc9/0x1190 [ 1364.476517] ? __lockdep_init_map+0x100/0x5a0 [ 1364.481000] mount_fs+0xa3/0x310 [ 1364.484366] vfs_kern_mount.part.0+0x68/0x470 [ 1364.488864] do_mount+0x115c/0x2f50 [ 1364.492484] ? cmp_ex_sort+0xc0/0xc0 [ 1364.496186] ? __do_page_fault+0x180/0xd60 [ 1364.500415] ? copy_mount_string+0x40/0x40 [ 1364.504645] ? memset+0x20/0x40 [ 1364.507911] ? copy_mount_options+0x26f/0x380 [ 1364.512398] ksys_mount+0xcf/0x130 [ 1364.515926] __x64_sys_mount+0xba/0x150 [ 1364.519888] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1364.524456] do_syscall_64+0xf9/0x620 [ 1364.528255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.533433] RIP: 0033:0x467b1a [ 1364.536617] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.555503] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1364.563212] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1364.570464] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1364.577721] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1364.584976] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1364.592228] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:42 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000100)={0x2, 0x108000}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000300)) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_RUN(r0, 0xae80, 0x0) 09:51:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:42 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020039d0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1366.841361] FAULT_INJECTION: forcing a failure. [ 1366.841361] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.868187] ISOFS: unable to read i-node block [ 1366.877558] isofs_fill_super: get root inode failed [ 1366.878171] CPU: 1 PID: 32585 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1366.890483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.899925] Call Trace: [ 1366.902532] dump_stack+0x1fc/0x2ef [ 1366.906180] should_fail.cold+0xa/0xf [ 1366.910176] ? setup_fault_attr+0x200/0x200 [ 1366.914506] ? lock_acquire+0x170/0x3c0 [ 1366.918499] __should_failslab+0x115/0x180 [ 1366.922751] should_failslab+0x5/0x10 [ 1366.926568] __kmalloc_track_caller+0x2a6/0x3c0 [ 1366.931254] ? kstrdup_const+0x53/0x80 [ 1366.935147] kstrdup+0x36/0x70 [ 1366.938340] kstrdup_const+0x53/0x80 [ 1366.942050] alloc_vfsmnt+0xb5/0x780 [ 1366.945764] vfs_kern_mount.part.0+0x27/0x470 [ 1366.950254] ? kfree+0x110/0x210 [ 1366.953611] vfs_kern_mount+0x3c/0x60 [ 1366.957407] btrfs_mount+0x23a/0xaa0 [ 1366.961115] ? btrfs_show_options+0xfd0/0xfd0 [ 1366.965613] ? __mutex_unlock_slowpath+0xea/0x610 [ 1366.970449] ? check_preemption_disabled+0x41/0x280 [ 1366.975468] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1366.980485] ? pcpu_alloc+0xc9/0x1190 [ 1366.984292] ? __lockdep_init_map+0x100/0x5a0 [ 1366.988791] mount_fs+0xa3/0x310 [ 1366.992155] vfs_kern_mount.part.0+0x68/0x470 [ 1366.996656] do_mount+0x115c/0x2f50 [ 1367.000285] ? cmp_ex_sort+0xc0/0xc0 [ 1367.004019] ? __do_page_fault+0x180/0xd60 [ 1367.008252] ? copy_mount_string+0x40/0x40 [ 1367.012487] ? memset+0x20/0x40 [ 1367.015757] ? copy_mount_options+0x26f/0x380 [ 1367.020243] ksys_mount+0xcf/0x130 [ 1367.023776] __x64_sys_mount+0xba/0x150 [ 1367.027916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1367.032485] do_syscall_64+0xf9/0x620 [ 1367.036283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.041461] RIP: 0033:0x467b1a [ 1367.044645] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1367.063644] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1367.071352] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1367.078606] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 09:51:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r3 = dup2(r2, r2) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="b805000000b9a4e800000f01c10f01c50f01c30f0f13bf0f01c40f380b2f66bad10466b8540066ef0fc7a8000000000fc79d0e590000d1900f460c27", 0x3c}], 0x1, 0x62, &(0x7f00000001c0), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1367.085861] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1367.093116] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1367.100370] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:43 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x7) 09:51:43 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e852f020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10201, 0x0, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) openat(r3, &(0x7f0000000000)='./file0\x00', 0xa4a440, 0x164) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x100000001) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1367.312125] FAULT_INJECTION: forcing a failure. [ 1367.312125] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.386798] CPU: 0 PID: 32625 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1367.394727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.404087] Call Trace: [ 1367.406788] dump_stack+0x1fc/0x2ef [ 1367.410435] should_fail.cold+0xa/0xf [ 1367.414254] ? setup_fault_attr+0x200/0x200 [ 1367.418583] ? lock_acquire+0x170/0x3c0 [ 1367.422584] __should_failslab+0x115/0x180 [ 1367.426818] should_failslab+0x5/0x10 [ 1367.430609] __kmalloc_track_caller+0x2a6/0x3c0 [ 1367.435298] ? kstrdup_const+0x53/0x80 [ 1367.439177] kstrdup+0x36/0x70 [ 1367.442360] kstrdup_const+0x53/0x80 [ 1367.446064] alloc_vfsmnt+0xb5/0x780 [ 1367.449770] vfs_kern_mount.part.0+0x27/0x470 [ 1367.454258] ? kfree+0x110/0x210 [ 1367.457625] vfs_kern_mount+0x3c/0x60 [ 1367.461427] btrfs_mount+0x23a/0xaa0 [ 1367.465146] ? btrfs_show_options+0xfd0/0xfd0 [ 1367.469630] ? __mutex_unlock_slowpath+0xea/0x610 [ 1367.474481] ? check_preemption_disabled+0x41/0x280 [ 1367.479602] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1367.484613] ? pcpu_alloc+0xc9/0x1190 [ 1367.488407] ? __lockdep_init_map+0x100/0x5a0 [ 1367.492894] mount_fs+0xa3/0x310 [ 1367.496255] vfs_kern_mount.part.0+0x68/0x470 [ 1367.500743] do_mount+0x115c/0x2f50 [ 1367.504367] ? cmp_ex_sort+0xc0/0xc0 [ 1367.508076] ? __do_page_fault+0x180/0xd60 [ 1367.512465] ? copy_mount_string+0x40/0x40 [ 1367.516696] ? memset+0x20/0x40 [ 1367.519982] ? copy_mount_options+0x26f/0x380 [ 1367.524475] ksys_mount+0xcf/0x130 [ 1367.528011] __x64_sys_mount+0xba/0x150 [ 1367.531975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1367.536553] do_syscall_64+0xf9/0x620 [ 1367.540354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.545616] RIP: 0033:0x467b1a [ 1367.548799] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1367.567690] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1367.575404] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1367.582666] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1367.589930] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1367.597201] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1367.604458] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000040020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffff60000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8560020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = accept4$netrom(r1, &(0x7f00000001c0)={{0x3, @rose}, [@null, @rose, @netrom, @default, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000140)=0x48, 0x800) fsetxattr$security_ima(r3, &(0x7f0000000240), &(0x7f0000000280)=@md5={0x1, "e30691e016979017ecc6e5eae8acf94f"}, 0x11, 0x3) sendfile(r2, r1, 0x0, 0x100000001) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/time\x00') ioctl$BTRFS_IOC_SNAP_CREATE(r6, 0x50009401, &(0x7f0000000300)={{r1}, "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"}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) 09:51:45 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1369.894651] FAULT_INJECTION: forcing a failure. [ 1369.894651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1369.906494] CPU: 0 PID: 32664 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1369.914383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.923740] Call Trace: [ 1369.926354] dump_stack+0x1fc/0x2ef [ 1369.930006] should_fail.cold+0xa/0xf [ 1369.933830] ? setup_fault_attr+0x200/0x200 [ 1369.938181] __alloc_pages_nodemask+0x239/0x2890 [ 1369.942947] ? __lock_acquire+0x6de/0x3ff0 [ 1369.947288] ? __lock_acquire+0x6de/0x3ff0 [ 1369.951635] ? mark_held_locks+0xf0/0xf0 [ 1369.955711] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1369.960559] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 1369.965585] ? __lock_acquire+0x6de/0x3ff0 [ 1369.965612] ? debug_check_no_obj_freed+0x201/0x490 [ 1369.965630] ? lock_downgrade+0x720/0x720 [ 1369.965647] ? lock_acquire+0x170/0x3c0 [ 1369.983067] cache_grow_begin+0xa4/0x8a0 [ 1369.987126] ? setup_fault_attr+0x200/0x200 [ 1369.991442] ? lock_acquire+0x170/0x3c0 [ 1369.995520] cache_alloc_refill+0x273/0x340 [ 1369.999862] kmem_cache_alloc_node_trace+0x39e/0x3b0 [ 1370.004958] __kmalloc_node+0x38/0x70 [ 1370.008752] kvmalloc_node+0xb4/0xf0 [ 1370.012471] btrfs_mount_root+0x13f/0x1830 [ 1370.016706] ? btrfs_decode_error+0x70/0x70 [ 1370.021022] ? __mutex_unlock_slowpath+0xea/0x610 [ 1370.025874] ? check_preemption_disabled+0x41/0x280 [ 1370.030987] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1370.035994] ? pcpu_alloc+0xc9/0x1190 [ 1370.039785] ? __lockdep_init_map+0x100/0x5a0 [ 1370.044270] mount_fs+0xa3/0x310 [ 1370.047628] vfs_kern_mount.part.0+0x68/0x470 [ 1370.052133] ? kfree+0x110/0x210 [ 1370.055492] vfs_kern_mount+0x3c/0x60 [ 1370.059284] btrfs_mount+0x23a/0xaa0 [ 1370.063003] ? btrfs_show_options+0xfd0/0xfd0 [ 1370.067494] ? __mutex_unlock_slowpath+0xea/0x610 [ 1370.072351] ? check_preemption_disabled+0x41/0x280 [ 1370.077378] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1370.082404] ? pcpu_alloc+0xc9/0x1190 [ 1370.086306] ? __lockdep_init_map+0x100/0x5a0 [ 1370.090795] mount_fs+0xa3/0x310 [ 1370.094169] vfs_kern_mount.part.0+0x68/0x470 [ 1370.098657] do_mount+0x115c/0x2f50 [ 1370.102276] ? cmp_ex_sort+0xc0/0xc0 [ 1370.105980] ? __do_page_fault+0x180/0xd60 [ 1370.110206] ? copy_mount_string+0x40/0x40 [ 1370.114434] ? memset+0x20/0x40 [ 1370.117703] ? copy_mount_options+0x26f/0x380 [ 1370.122208] ksys_mount+0xcf/0x130 [ 1370.125738] __x64_sys_mount+0xba/0x150 [ 1370.129702] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1370.134290] do_syscall_64+0xf9/0x620 [ 1370.138100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.143273] RIP: 0033:0x467b1a [ 1370.146480] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1370.165499] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1370.173406] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1370.180747] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1370.188006] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 09:51:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1370.195262] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1370.202519] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1370.219095] ISOFS: unable to read i-node block [ 1370.224437] isofs_fill_super: get root inode failed [ 1370.274211] ISOFS: unable to read i-node block [ 1370.279079] isofs_fill_super: get root inode failed 09:51:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x4, 0xa000}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:46 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ea020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1370.498178] FAULT_INJECTION: forcing a failure. [ 1370.498178] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.509889] CPU: 1 PID: 32728 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1370.517785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.527156] Call Trace: [ 1370.529739] dump_stack+0x1fc/0x2ef [ 1370.533362] should_fail.cold+0xa/0xf [ 1370.537156] ? setup_fault_attr+0x200/0x200 [ 1370.541467] ? lock_acquire+0x170/0x3c0 [ 1370.545433] __should_failslab+0x115/0x180 [ 1370.549664] should_failslab+0x5/0x10 [ 1370.553456] kmem_cache_alloc_trace+0x284/0x380 [ 1370.558118] btrfs_mount_root+0x188/0x1830 [ 1370.562347] ? btrfs_decode_error+0x70/0x70 [ 1370.566746] ? __mutex_unlock_slowpath+0xea/0x610 [ 1370.571582] ? check_preemption_disabled+0x41/0x280 [ 1370.576612] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1370.581630] ? pcpu_alloc+0xc9/0x1190 [ 1370.585441] ? __lockdep_init_map+0x100/0x5a0 [ 1370.589929] mount_fs+0xa3/0x310 [ 1370.593321] vfs_kern_mount.part.0+0x68/0x470 [ 1370.597802] ? kfree+0x110/0x210 [ 1370.601176] vfs_kern_mount+0x3c/0x60 [ 1370.604968] btrfs_mount+0x23a/0xaa0 [ 1370.608679] ? btrfs_show_options+0xfd0/0xfd0 [ 1370.613163] ? __mutex_unlock_slowpath+0xea/0x610 [ 1370.618011] ? check_preemption_disabled+0x41/0x280 [ 1370.623024] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1370.628036] ? pcpu_alloc+0xc9/0x1190 [ 1370.631824] ? __lockdep_init_map+0x100/0x5a0 [ 1370.636330] mount_fs+0xa3/0x310 [ 1370.639690] vfs_kern_mount.part.0+0x68/0x470 [ 1370.644178] do_mount+0x115c/0x2f50 [ 1370.647798] ? cmp_ex_sort+0xc0/0xc0 [ 1370.651503] ? __do_page_fault+0x180/0xd60 [ 1370.655727] ? copy_mount_string+0x40/0x40 [ 1370.659970] ? memset+0x20/0x40 [ 1370.663242] ? copy_mount_options+0x26f/0x380 [ 1370.667730] ksys_mount+0xcf/0x130 [ 1370.671262] __x64_sys_mount+0xba/0x150 [ 1370.675230] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1370.679801] do_syscall_64+0xf9/0x620 [ 1370.683596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.688859] RIP: 0033:0x467b1a [ 1370.692041] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1370.710927] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1370.718623] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1370.725881] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1370.733136] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1370.740407] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1370.747666] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000fffffffe0000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000050020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x111040, 0x0) syz_kvm_setup_cpu$x86(r3, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000001c0)="ba6100b8fa00ef0fc7680cba6100ed0f350f001e52200f221866b8000000000f23c80f21f866350c0000000f23f8ded9baf80c66b82c1b728666efbafc0c66edd7", 0x41}], 0x1, 0x40, &(0x7f0000000240)=[@dstype3={0x7, 0xe}, @dstype0={0x6, 0x5}], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:48 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f4020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1372.930562] FAULT_INJECTION: forcing a failure. [ 1372.930562] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.942665] CPU: 0 PID: 32755 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1372.950555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.959921] Call Trace: [ 1372.962507] dump_stack+0x1fc/0x2ef [ 1372.966150] should_fail.cold+0xa/0xf [ 1372.969963] ? setup_fault_attr+0x200/0x200 [ 1372.974280] ? lock_acquire+0x170/0x3c0 [ 1372.978250] __should_failslab+0x115/0x180 [ 1372.982476] should_failslab+0x5/0x10 [ 1372.986269] kmem_cache_alloc+0x277/0x370 [ 1372.990411] getname_kernel+0x4e/0x370 [ 1372.994301] kern_path+0x1b/0x40 [ 1372.997659] lookup_bdev+0xfc/0x220 [ 1373.001318] ? bd_acquire+0x440/0x440 [ 1373.005119] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.010138] blkdev_get_by_path+0x1b/0xd0 [ 1373.014276] btrfs_scan_one_device+0xd0/0xd00 [ 1373.018765] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1373.024289] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.029297] ? device_list_add+0xdd0/0xdd0 [ 1373.033523] ? kfree+0x110/0x210 [ 1373.036890] ? btrfs_mount_root+0x107a/0x1830 [ 1373.041381] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.045958] btrfs_mount_root+0x9df/0x1830 [ 1373.050194] ? btrfs_decode_error+0x70/0x70 [ 1373.054523] ? __mutex_unlock_slowpath+0xea/0x610 [ 1373.059360] ? check_preemption_disabled+0x41/0x280 [ 1373.064388] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1373.069391] ? pcpu_alloc+0xc9/0x1190 [ 1373.073182] ? __lockdep_init_map+0x100/0x5a0 [ 1373.077670] mount_fs+0xa3/0x310 [ 1373.081033] vfs_kern_mount.part.0+0x68/0x470 [ 1373.085949] ? kfree+0x110/0x210 [ 1373.089307] vfs_kern_mount+0x3c/0x60 [ 1373.093186] btrfs_mount+0x23a/0xaa0 [ 1373.096897] ? btrfs_show_options+0xfd0/0xfd0 [ 1373.101382] ? __mutex_unlock_slowpath+0xea/0x610 [ 1373.106219] ? check_preemption_disabled+0x41/0x280 [ 1373.111233] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1373.116239] ? pcpu_alloc+0xc9/0x1190 [ 1373.120031] ? __lockdep_init_map+0x100/0x5a0 [ 1373.124521] mount_fs+0xa3/0x310 [ 1373.127881] vfs_kern_mount.part.0+0x68/0x470 [ 1373.132367] do_mount+0x115c/0x2f50 [ 1373.135999] ? cmp_ex_sort+0xc0/0xc0 [ 1373.139719] ? __do_page_fault+0x180/0xd60 [ 1373.143946] ? copy_mount_string+0x40/0x40 [ 1373.148195] ? memset+0x20/0x40 [ 1373.151464] ? copy_mount_options+0x26f/0x380 [ 1373.155969] ksys_mount+0xcf/0x130 [ 1373.160629] __x64_sys_mount+0xba/0x150 [ 1373.164593] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.169164] do_syscall_64+0xf9/0x620 [ 1373.173151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.178331] RIP: 0033:0x467b1a [ 1373.181521] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.200690] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1373.208396] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1373.215656] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1373.222920] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1373.230178] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1373.237436] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:49 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020000a0020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1373.417161] FAULT_INJECTION: forcing a failure. [ 1373.417161] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.438518] CPU: 1 PID: 318 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1373.446280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.455726] Call Trace: [ 1373.458315] dump_stack+0x1fc/0x2ef [ 1373.461938] should_fail.cold+0xa/0xf [ 1373.465732] ? setup_fault_attr+0x200/0x200 [ 1373.470044] ? lock_acquire+0x170/0x3c0 [ 1373.474011] __should_failslab+0x115/0x180 [ 1373.478236] should_failslab+0x5/0x10 [ 1373.482044] kmem_cache_alloc+0x277/0x370 [ 1373.486182] getname_kernel+0x4e/0x370 [ 1373.490057] kern_path+0x1b/0x40 [ 1373.493415] lookup_bdev+0xfc/0x220 [ 1373.497029] ? bd_acquire+0x440/0x440 [ 1373.500830] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.505928] blkdev_get_by_path+0x1b/0xd0 [ 1373.510065] btrfs_scan_one_device+0xd0/0xd00 [ 1373.514549] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1373.519652] ? debug_check_no_obj_freed+0x201/0x490 [ 1373.524667] ? device_list_add+0xdd0/0xdd0 [ 1373.528889] ? kfree+0x110/0x210 [ 1373.532244] ? btrfs_mount_root+0x107a/0x1830 [ 1373.536729] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.541315] btrfs_mount_root+0x9df/0x1830 [ 1373.545545] ? btrfs_decode_error+0x70/0x70 [ 1373.549869] ? __mutex_unlock_slowpath+0xea/0x610 [ 1373.554703] ? check_preemption_disabled+0x41/0x280 [ 1373.559714] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1373.564718] ? pcpu_alloc+0xc9/0x1190 [ 1373.568510] ? __lockdep_init_map+0x100/0x5a0 [ 1373.572995] mount_fs+0xa3/0x310 [ 1373.576355] vfs_kern_mount.part.0+0x68/0x470 [ 1373.580835] ? kfree+0x110/0x210 [ 1373.584193] vfs_kern_mount+0x3c/0x60 [ 1373.587983] btrfs_mount+0x23a/0xaa0 [ 1373.591689] ? btrfs_show_options+0xfd0/0xfd0 [ 1373.596168] ? __mutex_unlock_slowpath+0xea/0x610 [ 1373.601003] ? check_preemption_disabled+0x41/0x280 [ 1373.606015] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1373.611020] ? pcpu_alloc+0xc9/0x1190 [ 1373.614823] ? __lockdep_init_map+0x100/0x5a0 [ 1373.619313] mount_fs+0xa3/0x310 [ 1373.622678] vfs_kern_mount.part.0+0x68/0x470 [ 1373.627169] do_mount+0x115c/0x2f50 [ 1373.630791] ? cmp_ex_sort+0xc0/0xc0 [ 1373.634505] ? __do_page_fault+0x180/0xd60 [ 1373.638730] ? copy_mount_string+0x40/0x40 [ 1373.642971] ? memset+0x20/0x40 [ 1373.646238] ? copy_mount_options+0x26f/0x380 [ 1373.650736] ksys_mount+0xcf/0x130 [ 1373.654268] __x64_sys_mount+0xba/0x150 [ 1373.658234] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1373.662803] do_syscall_64+0xf9/0x620 [ 1373.666594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.671770] RIP: 0033:0x467b1a [ 1373.674954] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.693854] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1373.701563] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1373.708819] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1373.716074] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1373.723340] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1373.730606] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f8020000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1373.882815] ISOFS: unable to read i-node block [ 1373.903446] isofs_fill_super: get root inode failed 09:51:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000004000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x40, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:51 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000220020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000240)="c4c3e96821000f30b9710800000f320f070f2384c74424002a410000c74424022e000000c7442406000000000f011c24c4e111fb5268b95e0b00000f320f20c035200000000f22c01b8bfdffffff", 0x4e}], 0x1, 0x20, &(0x7f0000000300)=[@cstype0={0x4, 0x9}, @flags={0x3, 0x29001}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000001c0)="64660fc774000f350f3800f8d9f3baf80c66b86e0eeb8566efbafc0cb8c500eff30fc7320f20d86635080000000f22d80f01f10f20c06635040000000f22c00f01df", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1376.022529] ISOFS: unable to read i-node block [ 1376.027172] isofs_fill_super: get root inode failed [ 1376.044043] FAULT_INJECTION: forcing a failure. [ 1376.044043] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.055426] CPU: 0 PID: 386 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1376.063140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.072490] Call Trace: [ 1376.075084] dump_stack+0x1fc/0x2ef [ 1376.078708] should_fail.cold+0xa/0xf [ 1376.082511] ? setup_fault_attr+0x200/0x200 [ 1376.086854] ? lock_acquire+0x170/0x3c0 [ 1376.090840] __should_failslab+0x115/0x180 [ 1376.095067] should_failslab+0x5/0x10 [ 1376.098851] __kmalloc_track_caller+0x2a6/0x3c0 [ 1376.103505] ? btrfs_mount_root+0x364/0x1830 [ 1376.107903] kstrdup+0x36/0x70 [ 1376.111096] btrfs_mount_root+0x364/0x1830 [ 1376.115331] ? btrfs_decode_error+0x70/0x70 [ 1376.119704] ? __mutex_unlock_slowpath+0xea/0x610 [ 1376.124546] ? check_preemption_disabled+0x41/0x280 [ 1376.129573] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1376.134586] ? pcpu_alloc+0xc9/0x1190 [ 1376.138392] ? __lockdep_init_map+0x100/0x5a0 [ 1376.143122] mount_fs+0xa3/0x310 [ 1376.146524] vfs_kern_mount.part.0+0x68/0x470 [ 1376.151019] ? kfree+0x110/0x210 [ 1376.154382] vfs_kern_mount+0x3c/0x60 [ 1376.158198] btrfs_mount+0x23a/0xaa0 [ 1376.161935] ? btrfs_show_options+0xfd0/0xfd0 [ 1376.166425] ? __mutex_unlock_slowpath+0xea/0x610 [ 1376.171275] ? check_preemption_disabled+0x41/0x280 [ 1376.176296] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1376.181308] ? pcpu_alloc+0xc9/0x1190 [ 1376.185118] ? __lockdep_init_map+0x100/0x5a0 [ 1376.189622] mount_fs+0xa3/0x310 [ 1376.193019] vfs_kern_mount.part.0+0x68/0x470 [ 1376.197512] do_mount+0x115c/0x2f50 [ 1376.201148] ? cmp_ex_sort+0xc0/0xc0 [ 1376.204862] ? __do_page_fault+0x180/0xd60 [ 1376.209083] ? copy_mount_string+0x40/0x40 [ 1376.213308] ? memset+0x20/0x40 [ 1376.216579] ? copy_mount_options+0x26f/0x380 [ 1376.221077] ksys_mount+0xcf/0x130 [ 1376.224621] __x64_sys_mount+0xba/0x150 [ 1376.228601] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1376.233305] do_syscall_64+0xf9/0x620 [ 1376.237111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.242296] RIP: 0033:0x467b1a [ 1376.245482] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1376.264584] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1376.272289] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1376.279558] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1376.286917] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1376.294270] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1376.301547] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000014000/0xb000)=nil, 0xb000, 0x100000e, 0x4000010, r1, 0x50849000) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5, 0x2, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:52 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) [ 1376.557670] FAULT_INJECTION: forcing a failure. [ 1376.557670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1376.569507] CPU: 0 PID: 442 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1376.577214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.586561] Call Trace: [ 1376.589146] dump_stack+0x1fc/0x2ef [ 1376.592769] should_fail.cold+0xa/0xf [ 1376.596568] ? setup_fault_attr+0x200/0x200 [ 1376.600879] ? is_bpf_text_address+0xfc/0x1b0 [ 1376.605367] ? kernel_text_address+0xbd/0xf0 [ 1376.609785] __alloc_pages_nodemask+0x239/0x2890 [ 1376.614538] ? __lock_acquire+0x6de/0x3ff0 [ 1376.618763] ? mount_fs+0xa3/0x310 [ 1376.622307] ? vfs_kern_mount.part.0+0x68/0x470 [ 1376.626966] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1376.631795] ? vfs_kern_mount.part.0+0x68/0x470 [ 1376.636539] ? do_mount+0x115c/0x2f50 [ 1376.640330] ? ksys_mount+0xcf/0x130 [ 1376.644032] ? __x64_sys_mount+0xba/0x150 [ 1376.648169] ? do_syscall_64+0xf9/0x620 [ 1376.652132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.657495] ? lock_downgrade+0x720/0x720 [ 1376.661632] ? lock_acquire+0x170/0x3c0 [ 1376.665596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1376.670341] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1376.674912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1376.679664] cache_grow_begin+0xa4/0x8a0 [ 1376.683715] ? setup_fault_attr+0x200/0x200 [ 1376.688026] ? lock_acquire+0x170/0x3c0 [ 1376.691993] cache_alloc_refill+0x273/0x340 [ 1376.696311] kmem_cache_alloc_trace+0x354/0x380 [ 1376.701085] btrfs_mount_root+0x1e1/0x1830 [ 1376.705318] ? btrfs_decode_error+0x70/0x70 [ 1376.709633] ? __mutex_unlock_slowpath+0xea/0x610 [ 1376.714470] ? check_preemption_disabled+0x41/0x280 [ 1376.719479] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1376.724489] ? pcpu_alloc+0xc9/0x1190 [ 1376.728279] ? __lockdep_init_map+0x100/0x5a0 [ 1376.732766] mount_fs+0xa3/0x310 [ 1376.736146] vfs_kern_mount.part.0+0x68/0x470 [ 1376.740638] vfs_kern_mount+0x3c/0x60 [ 1376.744429] btrfs_mount+0x23a/0xaa0 [ 1376.748153] ? btrfs_show_options+0xfd0/0xfd0 [ 1376.752636] ? __mutex_unlock_slowpath+0xea/0x610 [ 1376.757470] ? check_preemption_disabled+0x41/0x280 [ 1376.762482] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1376.767669] ? pcpu_alloc+0xc9/0x1190 [ 1376.771461] ? __lockdep_init_map+0x100/0x5a0 [ 1376.775962] mount_fs+0xa3/0x310 [ 1376.779324] vfs_kern_mount.part.0+0x68/0x470 [ 1376.783813] do_mount+0x115c/0x2f50 [ 1376.787431] ? cmp_ex_sort+0xc0/0xc0 [ 1376.791141] ? __do_page_fault+0x180/0xd60 [ 1376.795368] ? copy_mount_string+0x40/0x40 [ 1376.799772] ? memset+0x20/0x40 [ 1376.803043] ? copy_mount_options+0x26f/0x380 [ 1376.807530] ksys_mount+0xcf/0x130 [ 1376.811063] __x64_sys_mount+0xba/0x150 [ 1376.815031] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1376.819692] do_syscall_64+0xf9/0x620 [ 1376.823507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.828682] RIP: 0033:0x467b1a [ 1376.831869] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1376.850846] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1376.858816] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1376.866076] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1376.873332] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1376.880599] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1376.888118] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000250020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8514030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:54 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100), 0x220a02, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x100000001) signalfd(r4, &(0x7f0000000140)={[0x6]}, 0x8) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 1378.991398] ISOFS: unable to read i-node block [ 1378.997584] isofs_fill_super: get root inode failed [ 1379.017271] FAULT_INJECTION: forcing a failure. [ 1379.017271] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.029028] CPU: 0 PID: 474 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1379.036740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.046360] Call Trace: [ 1379.048959] dump_stack+0x1fc/0x2ef [ 1379.052602] should_fail.cold+0xa/0xf [ 1379.056418] ? setup_fault_attr+0x200/0x200 [ 1379.060758] ? __lock_acquire+0x6de/0x3ff0 [ 1379.064996] __should_failslab+0x115/0x180 [ 1379.069223] should_failslab+0x5/0x10 [ 1379.073007] kmem_cache_alloc+0x3f/0x370 [ 1379.077051] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1379.082674] __radix_tree_create+0x314/0x540 [ 1379.087098] page_cache_tree_insert+0xac/0x3f0 [ 1379.092091] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1379.097530] ? lock_acquire+0x170/0x3c0 [ 1379.101487] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1379.106664] __add_to_page_cache_locked+0x46e/0xb60 [ 1379.111665] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1379.116487] ? iput+0xc9/0x860 [ 1379.119672] add_to_page_cache_lru+0x16a/0x680 [ 1379.124236] ? add_to_page_cache_locked+0x40/0x40 [ 1379.129064] do_read_cache_page+0x50a/0x1170 [ 1379.133629] ? blkdev_writepages+0x20/0x20 [ 1379.137848] btrfs_scan_one_device+0x195/0xd00 [ 1379.142422] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1379.147855] ? debug_check_no_obj_freed+0x201/0x490 [ 1379.152853] ? device_list_add+0xdd0/0xdd0 [ 1379.157064] ? kfree+0x110/0x210 [ 1379.160420] ? btrfs_mount_root+0x107a/0x1830 [ 1379.164896] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.169462] btrfs_mount_root+0x9df/0x1830 [ 1379.173744] ? btrfs_decode_error+0x70/0x70 [ 1379.178048] ? __mutex_unlock_slowpath+0xea/0x610 [ 1379.182873] ? check_preemption_disabled+0x41/0x280 [ 1379.187874] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1379.192874] ? pcpu_alloc+0xc9/0x1190 [ 1379.196655] ? __lockdep_init_map+0x100/0x5a0 [ 1379.201133] mount_fs+0xa3/0x310 [ 1379.204482] vfs_kern_mount.part.0+0x68/0x470 [ 1379.208963] ? kfree+0x110/0x210 [ 1379.212311] vfs_kern_mount+0x3c/0x60 [ 1379.216107] btrfs_mount+0x23a/0xaa0 [ 1379.219811] ? btrfs_show_options+0xfd0/0xfd0 [ 1379.224303] ? __mutex_unlock_slowpath+0xea/0x610 [ 1379.229139] ? check_preemption_disabled+0x41/0x280 [ 1379.234140] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1379.239148] ? pcpu_alloc+0xc9/0x1190 [ 1379.242928] ? __lockdep_init_map+0x100/0x5a0 [ 1379.247406] mount_fs+0xa3/0x310 [ 1379.250771] vfs_kern_mount.part.0+0x68/0x470 [ 1379.255350] do_mount+0x115c/0x2f50 [ 1379.258971] ? cmp_ex_sort+0xc0/0xc0 [ 1379.262677] ? __do_page_fault+0x180/0xd60 [ 1379.267007] ? copy_mount_string+0x40/0x40 [ 1379.271232] ? memset+0x20/0x40 [ 1379.274599] ? copy_mount_options+0x26f/0x380 [ 1379.279093] ksys_mount+0xcf/0x130 [ 1379.282619] __x64_sys_mount+0xba/0x150 [ 1379.286575] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.291398] do_syscall_64+0xf9/0x620 [ 1379.295185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.300353] RIP: 0033:0x467b1a [ 1379.303527] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.322404] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1379.330091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1379.337355] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1379.344691] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1379.351940] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1379.359190] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:55 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x3000, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000320020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1379.610014] FAULT_INJECTION: forcing a failure. [ 1379.610014] name failslab, interval 1, probability 0, space 0, times 0 09:51:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8562030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1379.667922] ISOFS: unable to read i-node block [ 1379.681915] CPU: 1 PID: 506 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1379.689022] isofs_fill_super: get root inode failed [ 1379.689651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.704009] Call Trace: [ 1379.706620] dump_stack+0x1fc/0x2ef [ 1379.710282] should_fail.cold+0xa/0xf [ 1379.714086] ? setup_fault_attr+0x200/0x200 [ 1379.718598] __should_failslab+0x115/0x180 [ 1379.722930] should_failslab+0x5/0x10 [ 1379.726737] __kmalloc+0x2ab/0x3c0 [ 1379.730366] ? device_list_add+0x85d/0xdd0 [ 1379.734633] device_list_add+0x85d/0xdd0 [ 1379.738827] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 1379.744535] btrfs_scan_one_device+0x33f/0xd00 [ 1379.749121] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1379.754218] ? debug_check_no_obj_freed+0x201/0x490 [ 1379.759233] ? device_list_add+0xdd0/0xdd0 [ 1379.763465] ? kfree+0x110/0x210 [ 1379.766816] ? btrfs_mount_root+0x107a/0x1830 [ 1379.771301] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.775870] btrfs_mount_root+0x9df/0x1830 [ 1379.780093] ? btrfs_decode_error+0x70/0x70 [ 1379.785072] ? __mutex_unlock_slowpath+0xea/0x610 [ 1379.789932] ? check_preemption_disabled+0x41/0x280 [ 1379.794997] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1379.800001] ? pcpu_alloc+0xc9/0x1190 [ 1379.803846] ? __lockdep_init_map+0x100/0x5a0 [ 1379.808423] mount_fs+0xa3/0x310 [ 1379.811793] vfs_kern_mount.part.0+0x68/0x470 [ 1379.816284] ? kfree+0x110/0x210 [ 1379.819673] vfs_kern_mount+0x3c/0x60 [ 1379.823519] btrfs_mount+0x23a/0xaa0 [ 1379.827217] ? btrfs_show_options+0xfd0/0xfd0 [ 1379.831731] ? __mutex_unlock_slowpath+0xea/0x610 [ 1379.836560] ? check_preemption_disabled+0x41/0x280 [ 1379.841562] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1379.846560] ? pcpu_alloc+0xc9/0x1190 [ 1379.850370] ? __lockdep_init_map+0x100/0x5a0 [ 1379.854858] mount_fs+0xa3/0x310 [ 1379.858209] vfs_kern_mount.part.0+0x68/0x470 [ 1379.862699] do_mount+0x115c/0x2f50 [ 1379.866323] ? cmp_ex_sort+0xc0/0xc0 [ 1379.870058] ? __do_page_fault+0x180/0xd60 [ 1379.874306] ? copy_mount_string+0x40/0x40 [ 1379.878530] ? memset+0x20/0x40 [ 1379.881795] ? copy_mount_options+0x26f/0x380 [ 1379.886292] ksys_mount+0xcf/0x130 [ 1379.889917] __x64_sys_mount+0xba/0x150 [ 1379.893887] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1379.898468] do_syscall_64+0xf9/0x620 [ 1379.902270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.907440] RIP: 0033:0x467b1a [ 1379.910625] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.929533] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1379.937244] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1379.944500] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1379.951779] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1379.959038] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 09:51:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000004770000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1379.966421] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:51:57 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000370020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8576030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:57 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x55323c5b1bb0eae5, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f00009d6000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f00000001c0)="0f01ca660f57150000000036f30f5b8bf1e8de1b64f4b8010000000f01c10fc71d7e1e29dfb805000000b96c0d00000f01d9660f5b4b0f66baf80cb8b4e9ac86ef66bafc0cb808000000ef263e660fc7b4fcd1000000", 0x56}], 0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) write$binfmt_script(r2, &(0x7f0000002980)=ANY=[@ANYBLOB="ba4af655b350099256f6704793adfa91d211cb3f7f2ee8a676db89921c68549a87b20007e07b3183a2ecafb3d9b455b452224fe0b8ebe6162cf6a0dc58a56359b2271380efc4662724985255a689fb2b219b0b4f50c161554c4b4d034ef354cd1c4b4fb8f474c23d3abeca2a90bc", @ANYBLOB="9d2bf147fa0031b47d73abc2892fbafe3ba604f73f09ddb3b72272cbe91c5c", @ANYRES64=r0], 0xffffffffffffffe6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f00009f1000/0x18000)=nil, &(0x7f0000001680)=[@text64={0x40, &(0x7f0000002880)="b9ca0a0000b86693ac06ba000000000f3026460f009d8600c0fec4a2918c19c744240000700000c7442402bfbad5e7c7442406000000000f011c24f3460f5d0df6000000c441f573f0f542df54203c660f388201b805000000b9710700000f01c1c4a1495f4c8600", 0x68}], 0x1, 0x20, &(0x7f00000026c0)=[@cstype0={0x4, 0xe}], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x20010, r3, 0xf7919000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff9, 0xa, &(0x7f0000002700)=[{&(0x7f0000000240)="c7c04a517886d810575a4529c939a8e781f67a7ddbbd7c7f3415b7485210dd446b5a348f8c3bcb078bc783192070ced5299aa08d290be8058a81e13ec1606f94353d057dcc845582ce1bf09d94516e2a60923037f35bd94211424cea2b7eae93e293a606339781df", 0x68, 0x7}, {&(0x7f0000000300)="3cab34adde99b41ad4a1ad417731ece4132a77e5a1e5762320c4c25b15c211aa16a569e6bc18d07a81b49f3ff39df066a32c446b2cfeda960399bcdc1804e5b939b24a72ab3a843fffe4ae9582e1bd44a88fb559782478716adce60f445e68d393896dacf3bfdce7eb7fc9212c7f0716aa2e", 0x72}, {&(0x7f0000000380)="ec7829479ce3cc6d25753087ea2978221c1fc7cf92b5137a417ccb68939f97ae1bf9836bacc506a14ccbbb3a933192e847afadae3802939c266713a127e360b843753c2f0039", 0x46, 0xfffffffffffffeff}, {&(0x7f0000000400)="0f58caaa030cab113266e5e5b5085137935a430ac136570673f92ad715ff38387aeb8203963320aea0ba432c1b2010a8f84995aa1b9d232fd3d4d6537e231194fe3e6a2597de0a67edc37e1bd710e593f1b4d0ed9b72c013df2ea3288cf451e3a694847dc36f6570a493c5707a9384b480fc53896012b7732da27cb6409bb6bcf434ae7b0520ac5a2d4c8fd3004951bfdf74868256bc6956bbbde477e482e7f6a920d588fe520c33fb81c598a0bc8d3e58f8f20ae5e0ad756431fc57296e57497ed137fb7c7c345555c7958969c25a81cae0fe5462cb4c9b52a18679a5ba2aae30cff9eb438c81ddc6a626d541ce09ed22e4b116521ed713040676b621b9c98ef09e4b7f6dc1bb61474f87abe133f3d68f5a7d42b06bc0401953c8dc7b1e2d56307f85f8ce699f1fc7be4aa25eed108f93bf144b3d3e1aa1a51a381fea97a044beb092e8baf8e18e8a0863628e492b9d5c81588a9666b433018e50a826c0156f15d3f3914d0a06f650e5ac6fade1761ffe973118ce319ac502d4cab9cc53d695f7cce67e080fa69a07d3a9b04dc27bf55f5bef1247785d578fda2a28881b1df36d21ebb76e3ad094cea15fcaee07a3acb80435979aa968b19ce23dde681a3e42dd98eb8ffa4b83d9b9d05efa31bf72f0065ae93be036b6e79fc772d00da8c13e306062df12a674dc50ab19abf1172506954014575317200b4a729ae6b228ba88b64410311e68c9069bcae648816b00b6071ae5e863392fe1d678d772d459560ff656290ff8c3e602bce4bb5b7b12cc484fb3eb32bdd40aebea83f8ded3f0d6583e406e4c4ed1db4009b8bc5f024b4fe3b9fadf9221303ea278946e041938933af5262c5c974177e799e77306b178f7a8c959ddb4c8a5117aef7abdc16fe51af00a809bc84befe03b804601e5dadcfccedf8d76021b2c3f7a6fdd2627d35f577934ca8187f151df4b1a0ef602386dae0fa73e0e87292f4db0c371c9ebbe3fea49403c82f907ff190d456253b871eccfbf3e30224ca2b2beb17c36869e96e87c6725b4d5ee5c8d91e3342e9b72195f67a0b2b6e3b99c7bfc2f993523fd2dd90dcf266bc812a9604a1c8c0f0a3aa23f661381a84ef511cbde2e3898210fb7d8b57e873f156264988f84a86b0140342edb21eff5aa8bdb445f38a4435e6116a6c1fd17499e2ebf3eb1d092105939addcdef83cf056c06b26e5df467f6fdd19cbda4081057a4d54dd9186f2003f50370c0f23947369dcc75882913a61c4ef25dece28284f51ab1d68c5d9383a1c1bae7f75adb01fccd80766918655b865eb7c7a20bb7e717531fbfdbaca82d240b470fefcb3fb8d5518eda685e1d96bb61dc34dddc4e29acf5c9230269d956fe177cd355fe9e07255512ba2c51ce10f1b1f0c4882c68c25af2b5c484dc58425e6d46111dedcc315c71d67b9e420be5f57248e3752d5c19e6e51f36d10cbd0f9ff1205d085c6d45c0363bb1211e6ffcaee7354e18244ab6d38494095a497fe969253cf29c9bbd9707af6981a7f2e4c1b3c0ee9f56c0b8152d5bc314f20afe4bdee50783cad573e2ca1f245e04afb432cf60b626765943d4c217529342c80a92dc7f0491982e15a67eede8783bf68fec97213aa8d1c0579be8261a0ae5a3f76f6bd4001f1271ddc13820e802753af5c3019ef0c84d7b3ed1e6c1aaae3a79a3f12186736cc5edab55e04976139a0335ef1d65aed0438f2d927e9ec59648d1ec94d716895bbf6a71dc04e9802a3aa15185230505de7256a6a7c3ba0400bdd4562e2f5f6fb081762540227cb579cc2bca3ab4dba33b88b12a6449cb96f4705ff2eb46290923c47f913d0259881411dd33d9ae5be52f01ac60356550a62d51f56495282606024a0c074cebadbfbff4621ce8435293c4c91ef70af5fd78329feb35de78e556e51961fc2640b72382e7ebae507bb1b29850bd3c2063e4a528ffdd60b4e66994bc97be63d8c42334007636418cb3d7ec9fe97092070c95276160868d4ff0aa74285af0cfa24495da6ffe7fe82d457d3e6c3ef3f667b41424d31f8e5c0b56ac6cceb7d14a444ded7408fc2ed1aaeef3133100ce0e030ac5874f3c092349d410e67fc27cd654203b044dcf6c7808d3c964663e41ef76e6c6b00c77de350346edfd0d294d68a36544206d19133fec8ce71701bc396d3c93423c91166458ee460beb8306b869ffc5c895ff428de6be5d125dd6f012994e32db7c8a7dfb3421e11b2f3b1d9fb3858a780ac27f1016664718ea8e2eb2ce623fa162448c5cb46b559963b1a28540437cdc691684abc13b40c1c8dc12658be30b6ffdf48fa4fb3e519c1ecae4cdf30c569fa5d6476fca1f9c1bb7acd0d275376d582c8e59f61fbab1e0da892ba71799b66626df5455483100ef39dae91305ecfe17badc7afcbbc7024d00f931a2d6b076e8623972d3c12b7c0cd2e3180bb61c6b9080c6d0f6c1be19f384ab5f26747ce0e33dc345bbe5ca7b1eb9c8301a18be8a4a45f9f1b6cbd3dcd3e886e81c131797dec935477d91469247b64a88682f4f651fe25ad6bd0451630053dcef679f4d860965c6945c436653e4dc2f12244ae89e8b6eeec13f22cdd4d66e1d4171ee9e27b2f5b73bdf705736f6e9a181c447774f8e78c896d54e45b5b6d97bf443f2f0eef51b2e7046877946f8c4fc72dcf99a1f03d0d9668797075449e59d4ba3929e3c83841fc1c37ea99a36bb207744f3686cfccd07dbbbf4f235921df1a8e82f50d51d1820f066de630d55a593a812a20d972ea8b6ba9a33c12657d4433ce53956a421aaa2b8195d3788c4d551b67dc34aa52c116206e398a79500c96a917bd47a3f9fa0f6fd2283758606836e2bf13d711218449e49c30be664ef3714b8ffcc5d5464aa4469e9d401511b40178ade83c72bcca1e8c3a378f7e30f066e1bc2ac7d3ce928de89b857f344864154aafd6aaa031d58a1cfb79627773a54aeabe8887b2392d93e4b4937f687494cac5f20e8d564e7cf7d8560e2b74523f402feea67bccb7ffb91ebd6b1cb2cdcb885b5518086431b863192c934cd75228bdba4ecdcbf62a50313675d35e419b220e5afd4f1c569b91df20af5f55fc4b961d8c02ada7de067cf3c17e2224c1b20204cb4774a6ef24751a47da4d233fc71174828f8662ee9f0352d627bc58482ef23e6b8b8c844c6a2163a57b357aed3a78fba2fb97a19ea5b0258d1d0f334c35cbd9a4d16b341c26c2dfaed1cdd4556509faf05439ae3e738e7a8f382040cd5aeba2027ceecca750f31153125b0e65e521471ca618f0aaf9df624cc84cef504c5f21e69d1ef080dbda009d55b6671e6c931908b1f6a4b9d40d09e6db582013630f294c8b49702b5699cdae5071d14da7fd024b8624880a42e2d16eb26a7750efb6e7c6b1e39ccdcbddac24ef02824db70b9a7ed44af068fa8d21a8dd62f88b251519e0fffc56b4ad193c4528a1b1aca87cf62579e7329886f7049d17b5d2c46ae6af3ad07a21a0c593066016637d7f2e49c1490a76829541d75c1eaf51e292cc16d8a2522927522bad99ba4f98329de787c7f9a4b5704d84ab1d7fdc66ce1d59ec7f70f1311d716a752de14d6d338c6e15e66727c77985eda8d1e61cb7fea9b0bf437c1b75122128fffa24327532a64a9f1e705511590ec1fb1f92e8e6d39ab23b3caef9dbc3436c1000d18553c6405ce20939a4e4c1ea7aeb4ad2c68c0fc887a376d91b8907c63d1ef1a51699bf6e07d45ab948511eb775fae06b4c9187e201a975af34c39645d5616e0ba641e9a8405698a4f178b66b5f59c547aa6e36cab1cd5549557feb213e85aa1d2140da6b3070ffd76886ae90e240fdf0d8a80925407342e934063d80157dcf5bab432a2404ab159de04b47d89f7fb1c3cc33164b4bb7a4176112dab34da4f088b2fc2934ba89d1266f1d2051a25de30e8eaedacebff5e2c548c10b0bde63cbcdde32621ab37778821d980f24ee5e37ac03722ee58f72e02edccdb69efb07efac343ff6c6bb2441d3027d63b2247ad522e08abe6099880aaafdd95dc32f24a09bc863d30e13aedd37469b7968f3919d1ee1b8a0fb0b3687daa5d800e8ac5a991ba09ae274d28194ca12cac77b55b8ad2ac55666195aa9d6d6a715f96faa874ef2c75bf66c0349c51cc8246e902538ad375895913507623d35c2e2f9924660f71afe128da35ecbd60740f938bf2f476b867542533e7a59bc8b21d9b20529afef4e62aaf6b02243bec90dbc118063e6eb82c522931adaec72c7817d1812b54ba4a0c54e80cd56e6367961527bd5416f4dceebab874f49d469d123c5d2cd6adfa20caf3f5a824ab61a5bac7a5a9103e300e383b0f7cd0062b148fd3f39d5b7f4bf4d0f81f15c2f50bbeaa45e63f87557269ffe16d2c2dd94c693fc29d08e5fbe3525ba1327a5e86081ae606d27e16e4da47d0196802dfa921ece69640ce4dd2173ea8b14450e10f29eaea11e5eee917e41b6d39f44923416feb03f24ebf07a4fdce09ff7fcb1b8791a2ce80024ba6ac91936d99bf5a9a840f8bef78b67daa02509338b1ed5ee18109be21984cd747d9032bda70ddb1447d4a4f19048c076dd20ed812034b15a12d51205dd409027ff091b3ce0e98cf75a98f3f38ca401e7e2d2f292c3afcbd4707390644038e8786b7b934e0efc19319bab308bf84c74b95aec8c6e0ec516b8bf49acd258d255b40e68d07ab5b9659bf58da04f62eafb700ed23eab27add5fb78160092944417d85468b88b8025cc3d13d3681dfc7f12b19c65e0d99c274b8d4cafbb36b11c7b73ec43cdc4d395e1e79aca25c9706b7905453a1b82af63b134a473153c677988fa4214ce765cbafad480f0207a7c58bc59f6812a76f6ca6500b775e9002da3d60f6b5072bd6b5e589539c224170645c454df0b64e29aada9085885783e5971f45b6c3e44eaec2b19e1249feb41bb1a6d79cf17acd3588982ad95dc9fb6bb58c3152e8b4bb3d7864e0b04e9acba1ad6b03bae4dfce297d75690411fb5bb17fb34261f900a4a2755e4d336aea853463acb2ed8639692619b9f77fc71b37085310ba301c57202b1620491127bd4cdac0ad77f64feb73225ab6a88deb457ad0b736b5e57fa5404cebbc7b0e8ebde820fac56cd24f9097dda00f32223494dc97078555320e934cb8423779461b680defb83eae6528e507d032d172c9eb525d243cbfd7ce8461e9f33a731b29756bb127ba14f3fef0261ddf84e162a253cdbc5d8e05032b01d20288cc88c42947e09e52afd3236cea0752dd0930340f5ba7184852d2733a2838866791adaa39b7754e1a26655d27cdf28d0ff323a2ad4c24e8d5f1909fef811ce80729c1cb6c3948cdfdba6493d640b6bebaad43807841e1694bb3f911b05c884d57d8d80fed039deac477fd5d54c28c39568fd43fce3d290c2d813ae48bf0b203d9f3cafe74ca06343b845a7e9c4ef46923762bc16672581b10e3d32d788803b971cb1a3c421d1a7e4520d5a4e30498d18b39a8f3823784f1fbaf825c249b848187af3318fce53d54616e432af3fac5842919bdc36de0d88d9b05138f84e2209053669c80db93e0487bd3f3b0c4f27f2454c08a3a9c998e850569379a4a8a78de203c48c2afe8d5ad744ea91ed9891f6bc50d855d9f14fb4bb02a5701e7a9b6548c2b17a9d0a1b84e2efff336d6dbe0638ca2a4f7e17b0b3bc5b2b6197e64a56858bfa07ba1af43ccbe51c72007f2287c44ad89cd32cac94b982b2b6b48dd7c8d649036971caa8361cd97f93702669aa1e832796d8844978381d3cda42139113b0c182df689ccf134bdc45", 0x1000, 0x200}, {&(0x7f0000001400)="45c3ec571e9c7b5ad6740fa21e19856dc10013df9b87be78e0258563d26e7242e4e4d68dbfdf873479de3a93b46e986dc5e6cccc96598526fd25e04aa9b31a6b2e0081c45a7722883475b1af09a4952ceeb2b2db35e388d09df706552eb1a1f1a7c111ec10fb289d9207a42cc00014b98b95a71af7fdad619e9db22567e2f7e7b0744b57ca509a3eb1d7cc5d7ae0c76db78f722eb03eec8bc3accb186876d9de195330edc8adec7c1cb38b5d3adffbdce6d4d3c32f5daa6b509a48284fd4a1242cf7f5ba15ab364f231da04b148dd71b30513592bfb7b5e88455030499694c435f2c3c2cbc4a01b235", 0xe9}, {&(0x7f0000001500)="d82a1b9e730e56223c6212e2fbacb32beb5c7264e644858f2eec5215e3d8acd94fcb32c5e5b9bfe1e0fb4df2518df1e017a79adb19d97da9a95be160ef71131dc283d53eb55c80a2a2d0fcb2b19551", 0x4f, 0xfffffffffffffffe}, {&(0x7f0000001580)="09461deae66301b8ce63c57d9f1f0b4c23bc44e66c61ac93133464e972165f591e329d71e05466127969f53e1d5676cddb94bde05a904cdc04e5c7d4f0226fab56e5ca9f5b1487b60449926daf82497d5e300fee15bcfe4bc4184bde0177e5dae6b6d04fd23ee7985858b8aa07e9f8cc43a5d1aa4382a5a67ebd2319c3d64e14f8272a2c1360cc23ba52cdfe003d23e7b5145d9bece3b00d8006f0946428d4631fba4bc64ae4ea4e7ab01e1cbc7d6e20f3fbe79a4e88dce2e203948546ff0bf5a179c2ed0de9b6c7a867b7418fd7e6c4a816f3362ab2b704596e094ee47b994796aab644505c", 0xe6, 0xc8}, {&(0x7f0000001680), 0x0, 0x40}, {&(0x7f00000016c0)="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", 0x1000, 0x3f}, {&(0x7f00000026c0), 0x0, 0x17cfe615}], 0xc880, &(0x7f0000002800)={[{}, {@chk_data_crc}, {}, {@compr_lzo}, {@no_chk_data_crc}, {@compr_none}, {@norm_unmount}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user}]}) mmap(&(0x7f0000aa3000/0x3000)=nil, 0x3000, 0x3, 0x100010, r4, 0x23249000) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1382.072147] ISOFS: unable to read i-node block [ 1382.077128] FAULT_INJECTION: forcing a failure. [ 1382.077128] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.094400] isofs_fill_super: get root inode failed [ 1382.107368] CPU: 1 PID: 556 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 09:51:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1382.115110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.124478] Call Trace: [ 1382.127086] dump_stack+0x1fc/0x2ef [ 1382.130731] should_fail.cold+0xa/0xf [ 1382.134554] ? setup_fault_attr+0x200/0x200 [ 1382.138981] __should_failslab+0x115/0x180 [ 1382.143230] should_failslab+0x5/0x10 [ 1382.147025] __kmalloc+0x2ab/0x3c0 [ 1382.150552] ? device_list_add+0x85d/0xdd0 [ 1382.154781] device_list_add+0x85d/0xdd0 [ 1382.158870] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 1382.164694] btrfs_scan_one_device+0x33f/0xd00 [ 1382.169305] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1382.174407] ? debug_check_no_obj_freed+0x201/0x490 [ 1382.179424] ? device_list_add+0xdd0/0xdd0 [ 1382.184020] ? kfree+0x110/0x210 [ 1382.187381] ? btrfs_mount_root+0x107a/0x1830 [ 1382.191864] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1382.196434] btrfs_mount_root+0x9df/0x1830 [ 1382.200674] ? btrfs_decode_error+0x70/0x70 [ 1382.204995] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.209937] ? check_preemption_disabled+0x41/0x280 [ 1382.214957] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.219979] ? pcpu_alloc+0xc9/0x1190 [ 1382.223782] ? __lockdep_init_map+0x100/0x5a0 [ 1382.228277] mount_fs+0xa3/0x310 [ 1382.231659] vfs_kern_mount.part.0+0x68/0x470 [ 1382.236139] ? kfree+0x110/0x210 [ 1382.239506] vfs_kern_mount+0x3c/0x60 [ 1382.243305] btrfs_mount+0x23a/0xaa0 [ 1382.247003] ? btrfs_show_options+0xfd0/0xfd0 [ 1382.251491] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.256344] ? check_preemption_disabled+0x41/0x280 [ 1382.261357] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.266417] ? pcpu_alloc+0xc9/0x1190 [ 1382.270216] ? __lockdep_init_map+0x100/0x5a0 [ 1382.274705] mount_fs+0xa3/0x310 [ 1382.278069] vfs_kern_mount.part.0+0x68/0x470 [ 1382.282580] do_mount+0x115c/0x2f50 [ 1382.286205] ? cmp_ex_sort+0xc0/0xc0 [ 1382.289929] ? __do_page_fault+0x180/0xd60 [ 1382.294159] ? copy_mount_string+0x40/0x40 [ 1382.298400] ? memset+0x20/0x40 [ 1382.301682] ? copy_mount_options+0x26f/0x380 [ 1382.306175] ksys_mount+0xcf/0x130 [ 1382.309714] __x64_sys_mount+0xba/0x150 [ 1382.313730] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1382.318315] do_syscall_64+0xf9/0x620 [ 1382.322151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.327324] RIP: 0033:0x467b1a [ 1382.330499] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1382.349396] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1382.357101] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1382.364357] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 09:51:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0xa3a, 0xc13e, 0x1000000000000, 0x0, 0x4, 0x8001, 0x800, 0xc00000, 0x81, 0x1ff, 0x80000000, 0x400, 0x7ff, 0x75f13542, 0x400, 0x1], 0x2000, 0x100}) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1382.371634] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1382.378897] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1382.386161] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:51:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000440020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:51:58 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:51:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:51:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x10004, 0x2, 0x1, 0x1000, &(0x7f0000014000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10001, 0x3, 0x100000, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:51:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8580030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1382.639475] ISOFS: unable to read i-node block [ 1382.644334] isofs_fill_super: get root inode failed [ 1382.713428] FAULT_INJECTION: forcing a failure. [ 1382.713428] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.744508] CPU: 1 PID: 604 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1382.752253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:51:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000100)="f30f098fe834a2cd000f97e3b9230000400f3266b8c8000f00d865f20f5ca00000000036f466baf80cb8442c618aef66bafc0cb8f0dd0000efea74000000000036d936", 0x43}], 0x1, 0xa, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1382.761626] Call Trace: [ 1382.764280] dump_stack+0x1fc/0x2ef [ 1382.768002] should_fail.cold+0xa/0xf [ 1382.771809] ? vfs_kern_mount+0x3c/0x60 [ 1382.775768] ? setup_fault_attr+0x200/0x200 [ 1382.780091] ? blk_queue_enter+0x40b/0xb70 [ 1382.784326] __should_failslab+0x115/0x180 [ 1382.788558] should_failslab+0x5/0x10 [ 1382.792350] kmem_cache_alloc_node+0x54/0x3b0 [ 1382.796840] create_task_io_context+0x2c/0x430 [ 1382.801424] generic_make_request_checks+0x1c4f/0x22e0 [ 1382.806700] ? should_fail_bio.isra.0+0xa0/0xa0 [ 1382.811406] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.816416] ? kmem_cache_alloc+0x315/0x370 [ 1382.820751] generic_make_request+0x23f/0xdf0 [ 1382.825245] ? blk_put_request+0x110/0x110 [ 1382.829467] ? check_preemption_disabled+0x41/0x280 [ 1382.834484] ? alloc_buffer_head+0x20/0x130 [ 1382.838829] submit_bio+0xb1/0x430 [ 1382.842365] ? generic_make_request+0xdf0/0xdf0 [ 1382.847021] ? check_preemption_disabled+0x41/0x280 [ 1382.852036] ? guard_bio_eod+0x2a0/0x650 [ 1382.856082] submit_bh_wbc+0x5a7/0x760 [ 1382.859974] block_read_full_page+0x7cf/0xd10 [ 1382.864551] ? block_llseek+0xc0/0xc0 [ 1382.868348] ? __bread_gfp+0x300/0x300 [ 1382.872228] ? add_to_page_cache_locked+0x40/0x40 [ 1382.877057] do_read_cache_page+0x533/0x1170 [ 1382.881464] ? blkdev_writepages+0x20/0x20 [ 1382.885694] btrfs_scan_one_device+0x195/0xd00 [ 1382.890279] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1382.895419] ? debug_check_no_obj_freed+0x201/0x490 [ 1382.900536] ? device_list_add+0xdd0/0xdd0 [ 1382.904764] ? kfree+0x110/0x210 [ 1382.908126] ? btrfs_mount_root+0x107a/0x1830 [ 1382.912626] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1382.917250] btrfs_mount_root+0x9df/0x1830 [ 1382.921504] ? btrfs_decode_error+0x70/0x70 [ 1382.925869] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.930699] ? check_preemption_disabled+0x41/0x280 [ 1382.935709] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.940805] ? pcpu_alloc+0xc9/0x1190 [ 1382.944603] ? __lockdep_init_map+0x100/0x5a0 [ 1382.949091] mount_fs+0xa3/0x310 [ 1382.952462] vfs_kern_mount.part.0+0x68/0x470 [ 1382.956941] ? kfree+0x110/0x210 [ 1382.960306] vfs_kern_mount+0x3c/0x60 [ 1382.964194] btrfs_mount+0x23a/0xaa0 [ 1382.967905] ? btrfs_show_options+0xfd0/0xfd0 [ 1382.972399] ? __mutex_unlock_slowpath+0xea/0x610 [ 1382.977409] ? check_preemption_disabled+0x41/0x280 [ 1382.982429] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1382.987458] ? pcpu_alloc+0xc9/0x1190 [ 1382.991251] ? __lockdep_init_map+0x100/0x5a0 [ 1382.995743] mount_fs+0xa3/0x310 [ 1382.999137] vfs_kern_mount.part.0+0x68/0x470 [ 1383.003638] do_mount+0x115c/0x2f50 [ 1383.007436] ? cmp_ex_sort+0xc0/0xc0 [ 1383.011142] ? __do_page_fault+0x180/0xd60 [ 1383.015368] ? copy_mount_string+0x40/0x40 [ 1383.019614] ? memset+0x20/0x40 [ 1383.022900] ? copy_mount_options+0x26f/0x380 [ 1383.027392] ksys_mount+0xcf/0x130 [ 1383.030918] __x64_sys_mount+0xba/0x150 [ 1383.034967] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1383.039541] do_syscall_64+0xf9/0x620 [ 1383.043357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.048547] RIP: 0033:0x467b1a [ 1383.051729] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1383.070612] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1383.078310] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1383.085575] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1383.092851] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1383.100111] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1383.107386] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:52:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000000000000000000225c17d0300000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000600020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:52:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:52:00 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:52:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85c0030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000340)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='fdinfo\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000280)={0x10003, 0x1, 0x5000, 0x1000, &(0x7f0000366000/0x1000)=nil}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x275a, 0x0) r5 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r5, 0x0, 0x0, 0x48084, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000a45000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000100)="36ff2b0f01d4f30f096766c7442400c9857ede6766c7442402b8a100006766c744240600000000670f011c240f01c2660f592726260f58a90e00440f20c0663504000000440f22c0aa65360fc7980038", 0x50}], 0x1, 0xf1, &(0x7f0000000380)=[@cr4={0x1, 0x112}, @cr4={0x1, 0x4}], 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000300)={0x101ff, 0x4, 0x300e28f8766e7022, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:52:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1385.150243] FAULT_INJECTION: forcing a failure. [ 1385.150243] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.174758] ISOFS: unable to read i-node block [ 1385.189775] isofs_fill_super: get root inode failed [ 1385.204388] CPU: 0 PID: 656 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1385.212126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.221481] Call Trace: [ 1385.224083] dump_stack+0x1fc/0x2ef [ 1385.227732] should_fail.cold+0xa/0xf [ 1385.231594] ? setup_fault_attr+0x200/0x200 [ 1385.235935] __should_failslab+0x115/0x180 [ 1385.240186] should_failslab+0x5/0x10 [ 1385.243991] __kmalloc+0x2ab/0x3c0 [ 1385.247539] ? device_list_add+0x85d/0xdd0 [ 1385.251854] device_list_add+0x85d/0xdd0 [ 1385.256139] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 1385.261848] btrfs_scan_one_device+0x33f/0xd00 [ 1385.266419] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1385.271506] ? debug_check_no_obj_freed+0x201/0x490 [ 1385.276659] ? device_list_add+0xdd0/0xdd0 [ 1385.281492] ? kfree+0x110/0x210 [ 1385.284843] ? btrfs_mount_root+0x107a/0x1830 [ 1385.289345] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1385.293924] btrfs_mount_root+0x9df/0x1830 [ 1385.298249] ? btrfs_decode_error+0x70/0x70 [ 1385.302662] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.307511] ? check_preemption_disabled+0x41/0x280 [ 1385.312604] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.317611] ? pcpu_alloc+0xc9/0x1190 [ 1385.321408] ? __lockdep_init_map+0x100/0x5a0 [ 1385.325915] mount_fs+0xa3/0x310 [ 1385.329274] vfs_kern_mount.part.0+0x68/0x470 [ 1385.333823] ? kfree+0x110/0x210 [ 1385.337194] vfs_kern_mount+0x3c/0x60 [ 1385.340991] btrfs_mount+0x23a/0xaa0 [ 1385.344702] ? btrfs_show_options+0xfd0/0xfd0 [ 1385.349558] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.354401] ? check_preemption_disabled+0x41/0x280 [ 1385.359515] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.364534] ? pcpu_alloc+0xc9/0x1190 [ 1385.368335] ? __lockdep_init_map+0x100/0x5a0 [ 1385.372828] mount_fs+0xa3/0x310 [ 1385.376210] vfs_kern_mount.part.0+0x68/0x470 [ 1385.380692] do_mount+0x115c/0x2f50 [ 1385.384332] ? cmp_ex_sort+0xc0/0xc0 [ 1385.388048] ? __do_page_fault+0x180/0xd60 [ 1385.392310] ? copy_mount_string+0x40/0x40 [ 1385.396628] ? memset+0x20/0x40 [ 1385.399906] ? copy_mount_options+0x26f/0x380 [ 1385.404423] ksys_mount+0xcf/0x130 [ 1385.407969] __x64_sys_mount+0xba/0x150 [ 1385.411940] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1385.416505] do_syscall_64+0xf9/0x620 [ 1385.420317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.425628] RIP: 0033:0x467b1a [ 1385.428821] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:52:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85d0030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x10080, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000001c0)="baa000ed66b9800000c00f326635004000000f300f001ff30f5247dcf2ab0f01dfc051b6c7660f58e3baf80c66b8e157db8a66efbafc0cb0f5ee66b9320b000066b80300000066ba000000000f30", 0x4e}], 0x1, 0x10, &(0x7f0000000240), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pwrite64(r1, &(0x7f0000000100)="d5cadf21be5c3d3e4140fd480eab0cfb827b57ba2f506f933f1ef2ba577022a3764058491a0fb0df3ebd10d0f7525aa66dff55b2c8ef6bce447c358fbd95b7c1", 0x40, 0x2) [ 1385.447724] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1385.456395] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1385.463654] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1385.470950] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1385.478303] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1385.485567] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:52:01 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:52:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020008e0320004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:52:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1385.702514] FAULT_INJECTION: forcing a failure. [ 1385.702514] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.714439] CPU: 1 PID: 692 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1385.722509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.731868] Call Trace: [ 1385.734469] dump_stack+0x1fc/0x2ef [ 1385.738109] should_fail.cold+0xa/0xf [ 1385.741922] ? setup_fault_attr+0x200/0x200 [ 1385.746274] ? lock_acquire+0x170/0x3c0 [ 1385.750278] __should_failslab+0x115/0x180 [ 1385.754518] should_failslab+0x5/0x10 [ 1385.758322] kmem_cache_alloc+0x277/0x370 [ 1385.762469] getname_kernel+0x4e/0x370 [ 1385.766360] kern_path+0x1b/0x40 [ 1385.769716] lookup_bdev+0xfc/0x220 [ 1385.773331] ? bd_acquire+0x440/0x440 [ 1385.777141] ? list_sort.part.0+0x523/0x790 [ 1385.781463] ? try_release_extent_buffer+0x3a0/0x3a0 [ 1385.786644] blkdev_get_by_path+0x1b/0xd0 [ 1385.790795] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 1385.795304] open_fs_devices+0x5a3/0xa50 [ 1385.799395] ? find_fsid+0xb0/0xb0 [ 1385.802925] ? debug_check_no_obj_freed+0x201/0x490 [ 1385.807966] btrfs_open_devices+0x114/0x150 [ 1385.812280] btrfs_mount_root+0xa60/0x1830 [ 1385.816507] ? btrfs_decode_error+0x70/0x70 [ 1385.820820] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.825653] ? check_preemption_disabled+0x41/0x280 [ 1385.830665] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.835755] ? pcpu_alloc+0xc9/0x1190 [ 1385.839547] ? __lockdep_init_map+0x100/0x5a0 [ 1385.844036] mount_fs+0xa3/0x310 [ 1385.847395] vfs_kern_mount.part.0+0x68/0x470 [ 1385.851878] ? kfree+0x110/0x210 [ 1385.855235] vfs_kern_mount+0x3c/0x60 [ 1385.859026] btrfs_mount+0x23a/0xaa0 [ 1385.862820] ? btrfs_show_options+0xfd0/0xfd0 [ 1385.867321] ? __mutex_unlock_slowpath+0xea/0x610 [ 1385.872154] ? check_preemption_disabled+0x41/0x280 [ 1385.877164] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1385.882168] ? pcpu_alloc+0xc9/0x1190 [ 1385.885957] ? __lockdep_init_map+0x100/0x5a0 [ 1385.890531] mount_fs+0xa3/0x310 [ 1385.893893] vfs_kern_mount.part.0+0x68/0x470 [ 1385.898395] do_mount+0x115c/0x2f50 [ 1385.902019] ? cmp_ex_sort+0xc0/0xc0 [ 1385.905724] ? __do_page_fault+0x180/0xd60 [ 1385.909949] ? copy_mount_string+0x40/0x40 [ 1385.914184] ? memset+0x20/0x40 [ 1385.917890] ? copy_mount_options+0x26f/0x380 [ 1385.922378] ksys_mount+0xcf/0x130 [ 1385.925911] __x64_sys_mount+0xba/0x150 [ 1385.929896] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1385.934492] do_syscall_64+0xf9/0x620 [ 1385.938294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.943503] RIP: 0033:0x467b1a [ 1385.946695] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1385.965859] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1385.973559] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1385.981165] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1385.988514] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1385.995962] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1386.003315] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:52:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1386.189367] ISOFS: unable to read i-node block [ 1386.205440] isofs_fill_super: get root inode failed 09:52:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x84000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:52:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:52:03 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:52:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058002000200020002000200020002000200020008f0320004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:52:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f0030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1388.165679] ISOFS: unable to read i-node block [ 1388.197008] isofs_fill_super: get root inode failed 09:52:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000b00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:52:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f6030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000900320004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1388.326732] FAULT_INJECTION: forcing a failure. [ 1388.326732] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.338072] CPU: 1 PID: 747 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1388.345912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.355395] Call Trace: [ 1388.357986] dump_stack+0x1fc/0x2ef [ 1388.361732] should_fail.cold+0xa/0xf [ 1388.365537] ? setup_fault_attr+0x200/0x200 [ 1388.369841] ? __lock_acquire+0x6de/0x3ff0 [ 1388.374168] __should_failslab+0x115/0x180 [ 1388.378527] should_failslab+0x5/0x10 [ 1388.382328] kmem_cache_alloc+0x3f/0x370 [ 1388.386409] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 1388.392029] __radix_tree_create+0x314/0x540 [ 1388.396446] page_cache_tree_insert+0xac/0x3f0 [ 1388.401114] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1388.406619] ? lock_acquire+0x170/0x3c0 [ 1388.410600] ? __add_to_page_cache_locked+0x45e/0xb60 [ 1388.415780] __add_to_page_cache_locked+0x46e/0xb60 [ 1388.420782] ? page_cache_tree_insert+0x3f0/0x3f0 [ 1388.425617] add_to_page_cache_lru+0x16a/0x680 [ 1388.430182] ? add_to_page_cache_locked+0x40/0x40 [ 1388.435018] pagecache_get_page+0x478/0xd50 [ 1388.439343] __getblk_slow+0x216/0x9e0 [ 1388.443219] __bread_gfp+0x218/0x300 [ 1388.446917] btrfs_read_dev_super+0x8a/0x230 [ 1388.451312] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 1388.455789] open_fs_devices+0x5a3/0xa50 [ 1388.459836] ? find_fsid+0xb0/0xb0 [ 1388.463363] btrfs_open_devices+0x114/0x150 [ 1388.467678] btrfs_mount_root+0xa60/0x1830 [ 1388.471897] ? btrfs_decode_error+0x70/0x70 [ 1388.476214] ? __mutex_unlock_slowpath+0xea/0x610 [ 1388.481040] ? check_preemption_disabled+0x41/0x280 [ 1388.486042] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1388.491049] ? pcpu_alloc+0xc9/0x1190 [ 1388.494948] ? __lockdep_init_map+0x100/0x5a0 [ 1388.499449] mount_fs+0xa3/0x310 [ 1388.502830] vfs_kern_mount.part.0+0x68/0x470 [ 1388.507326] ? kfree+0x110/0x210 [ 1388.510697] vfs_kern_mount+0x3c/0x60 [ 1388.514490] btrfs_mount+0x23a/0xaa0 [ 1388.518193] ? btrfs_show_options+0xfd0/0xfd0 [ 1388.522692] ? __mutex_unlock_slowpath+0xea/0x610 [ 1388.527525] ? check_preemption_disabled+0x41/0x280 [ 1388.532526] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1388.537534] ? pcpu_alloc+0xc9/0x1190 [ 1388.541314] ? __lockdep_init_map+0x100/0x5a0 [ 1388.545793] mount_fs+0xa3/0x310 [ 1388.549157] vfs_kern_mount.part.0+0x68/0x470 [ 1388.553647] do_mount+0x115c/0x2f50 [ 1388.557255] ? cmp_ex_sort+0xc0/0xc0 [ 1388.560953] ? __do_page_fault+0x180/0xd60 [ 1388.565184] ? copy_mount_string+0x40/0x40 [ 1388.569404] ? memset+0x20/0x40 [ 1388.572662] ? copy_mount_options+0x26f/0x380 [ 1388.577153] ksys_mount+0xcf/0x130 [ 1388.580676] __x64_sys_mount+0xba/0x150 [ 1388.584642] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1388.589203] do_syscall_64+0xf9/0x620 [ 1388.592986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.598158] RIP: 0033:0x467b1a [ 1388.601332] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.620298] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 09:52:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1388.628079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1388.635335] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1388.642583] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1388.649833] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1388.657094] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1388.748335] ISOFS: unable to read i-node block 09:52:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000100)={0x2000, 0x8000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1388.773552] isofs_fill_super: get root inode failed 09:52:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x27, &(0x7f0000000240)="c4c69107787b049e6e859c2cbb8e4f93357af7a22899f339cb0e4f896abed4792bfbbe8d4a5767"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:52:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000910320004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:52:07 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000006c0)) 09:52:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000100)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:52:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000003f00000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) 09:52:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f8030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000", 0x97, 0x10000}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1391.169172] ISOFS: unable to read i-node block [ 1391.194114] isofs_fill_super: get root inode failed 09:52:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) syz_emit_ethernet(0x1096, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/4442], 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:52:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1391.276545] FAULT_INJECTION: forcing a failure. [ 1391.276545] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.307369] CPU: 1 PID: 841 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1391.315122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.324478] Call Trace: [ 1391.327078] dump_stack+0x1fc/0x2ef [ 1391.330724] should_fail.cold+0xa/0xf [ 1391.334545] ? setup_fault_attr+0x200/0x200 [ 1391.338874] ? lock_acquire+0x170/0x3c0 [ 1391.342862] __should_failslab+0x115/0x180 [ 1391.347110] should_failslab+0x5/0x10 [ 1391.350920] __kmalloc+0x2ab/0x3c0 [ 1391.354463] ? bio_alloc_bioset+0x3d7/0x5e0 [ 1391.358790] bio_alloc_bioset+0x3d7/0x5e0 [ 1391.362945] ? bvec_alloc+0x2f0/0x2f0 [ 1391.366756] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.371778] ? kmem_cache_alloc_trace+0x323/0x380 [ 1391.376641] btrfs_alloc_device+0xcd/0x670 [ 1391.380889] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 1391.385476] ? blkdev_put+0x85/0x520 [ 1391.389199] close_fs_devices.part.0+0x245/0x860 [ 1391.393970] btrfs_close_devices+0x95/0x1f0 [ 1391.398392] btrfs_mount_root+0x10b9/0x1830 [ 1391.402741] ? btrfs_decode_error+0x70/0x70 [ 1391.407074] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.412017] ? check_preemption_disabled+0x41/0x280 [ 1391.417051] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.422333] ? pcpu_alloc+0xc9/0x1190 [ 1391.426148] ? __lockdep_init_map+0x100/0x5a0 [ 1391.430655] mount_fs+0xa3/0x310 [ 1391.434041] vfs_kern_mount.part.0+0x68/0x470 [ 1391.438546] ? kfree+0x110/0x210 [ 1391.441919] vfs_kern_mount+0x3c/0x60 [ 1391.445728] btrfs_mount+0x23a/0xaa0 [ 1391.449452] ? btrfs_show_options+0xfd0/0xfd0 [ 1391.453958] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.458810] ? check_preemption_disabled+0x41/0x280 [ 1391.463839] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.468885] ? pcpu_alloc+0xc9/0x1190 [ 1391.472698] ? __lockdep_init_map+0x100/0x5a0 [ 1391.477199] mount_fs+0xa3/0x310 [ 1391.480567] vfs_kern_mount.part.0+0x68/0x470 [ 1391.485074] do_mount+0x115c/0x2f50 [ 1391.488691] ? cmp_ex_sort+0xc0/0xc0 [ 1391.492395] ? __do_page_fault+0x180/0xd60 [ 1391.496712] ? copy_mount_string+0x40/0x40 [ 1391.500941] ? memset+0x20/0x40 [ 1391.504208] ? copy_mount_options+0x26f/0x380 [ 1391.508699] ksys_mount+0xcf/0x130 [ 1391.512231] __x64_sys_mount+0xba/0x150 [ 1391.516195] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1391.520775] do_syscall_64+0xf9/0x620 [ 1391.524566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.529740] RIP: 0033:0x467b1a [ 1391.532920] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.551806] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1391.559501] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1391.566755] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 09:52:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000920320004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 09:52:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000008000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1391.574010] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1391.581262] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1391.588524] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 09:52:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000000000000000000fffffff600000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000006c0)={[{@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 1391.650777] ------------[ cut here ]------------ [ 1391.655572] kernel BUG at fs/btrfs/volumes.c:1058! [ 1391.666654] ISOFS: unable to read i-node block [ 1391.671272] isofs_fill_super: get root inode failed [ 1391.695548] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1391.700948] CPU: 1 PID: 841 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 1391.708653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.718003] RIP: 0010:close_fs_devices.part.0+0x674/0x860 [ 1391.723532] Code: 03 0f 8e 10 01 00 00 48 8b 44 24 10 c7 80 10 01 00 00 00 00 00 00 48 83 c4 40 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 2c b6 71 fe <0f> 0b e8 25 b6 71 fe 0f 0b e8 ae 8a a7 fe e9 f8 fb ff ff 4c 89 f7 [ 1391.742421] RSP: 0018:ffff8880402af840 EFLAGS: 00010246 [ 1391.747766] RAX: 0000000000040000 RBX: ffff8880a086f680 RCX: ffffc900131b3000 [ 1391.755021] RDX: 0000000000040000 RSI: ffffffff82f0dc94 RDI: 0000000000000007 [ 1391.762284] RBP: ffff88808fbd6000 R08: 0000000000000000 R09: fffffffffffff000 [ 1391.769535] R10: 0000000000000007 R11: 0000000000000000 R12: dffffc0000000000 [ 1391.776791] R13: ffff8880a086f720 R14: ffff8880a086f6a0 R15: fffffffffffffff4 [ 1391.784059] FS: 00007f4b78910700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1391.792288] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1391.798152] CR2: 00007f2863901000 CR3: 000000009d4f9000 CR4: 00000000001426e0 [ 1391.805408] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1391.812662] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1391.819926] Call Trace: [ 1391.822506] btrfs_close_devices+0x95/0x1f0 [ 1391.827248] btrfs_mount_root+0x10b9/0x1830 [ 1391.831559] ? btrfs_decode_error+0x70/0x70 [ 1391.835875] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.840708] ? check_preemption_disabled+0x41/0x280 [ 1391.845722] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.850843] ? pcpu_alloc+0xc9/0x1190 [ 1391.854629] ? __lockdep_init_map+0x100/0x5a0 [ 1391.859111] mount_fs+0xa3/0x310 [ 1391.862465] vfs_kern_mount.part.0+0x68/0x470 [ 1391.866942] ? kfree+0x110/0x210 [ 1391.870296] vfs_kern_mount+0x3c/0x60 [ 1391.874103] btrfs_mount+0x23a/0xaa0 [ 1391.877804] ? btrfs_show_options+0xfd0/0xfd0 [ 1391.882284] ? __mutex_unlock_slowpath+0xea/0x610 [ 1391.887129] ? check_preemption_disabled+0x41/0x280 [ 1391.892134] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1391.897154] ? pcpu_alloc+0xc9/0x1190 [ 1391.900940] ? __lockdep_init_map+0x100/0x5a0 [ 1391.905421] mount_fs+0xa3/0x310 [ 1391.908782] vfs_kern_mount.part.0+0x68/0x470 [ 1391.913263] do_mount+0x115c/0x2f50 [ 1391.916879] ? cmp_ex_sort+0xc0/0xc0 [ 1391.920593] ? __do_page_fault+0x180/0xd60 [ 1391.924833] ? copy_mount_string+0x40/0x40 [ 1391.929057] ? memset+0x20/0x40 [ 1391.932324] ? copy_mount_options+0x26f/0x380 [ 1391.936812] ksys_mount+0xcf/0x130 [ 1391.940338] __x64_sys_mount+0xba/0x150 [ 1391.944315] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1391.948889] do_syscall_64+0xf9/0x620 [ 1391.952694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.957880] RIP: 0033:0x467b1a [ 1391.961065] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.980044] RSP: 002b:00007f4b7890ffa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1391.987757] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 1391.995013] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4b78910000 [ 1392.002280] RBP: 00007f4b78910040 R08: 00007f4b78910040 R09: 0000000020000000 [ 1392.009532] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1392.016786] R13: 0000000020000100 R14: 00007f4b78910000 R15: 00000000200006c0 [ 1392.024128] Modules linked in: [ 1392.032750] ---[ end trace 5487395643b4c11e ]--- [ 1392.046441] RIP: 0010:close_fs_devices.part.0+0x674/0x860 09:52:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x348f6bd458ea0396, 0x2000, &(0x7f000000a000/0x2000)=nil}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000002c0)={0x6000, 0x14000}) recvmsg$unix(r5, &(0x7f0000000280)={&(0x7f0000000100), 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/74, 0x4a}], 0x1, &(0x7f0000000300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1392.053056] Code: 03 0f 8e 10 01 00 00 48 8b 44 24 10 c7 80 10 01 00 00 00 00 00 00 48 83 c4 40 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 2c b6 71 fe <0f> 0b e8 25 b6 71 fe 0f 0b e8 ae 8a a7 fe e9 f8 fb ff ff 4c 89 f7 [ 1392.075331] RSP: 0018:ffff8880402af840 EFLAGS: 00010246 [ 1392.083671] RAX: 0000000000040000 RBX: ffff8880a086f680 RCX: ffffc900131b3000 [ 1392.092917] RDX: 0000000000040000 RSI: ffffffff82f0dc94 RDI: 0000000000000007 [ 1392.101644] RBP: ffff88808fbd6000 R08: 0000000000000000 R09: fffffffffffff000 [ 1392.110395] R10: 0000000000000007 R11: 0000000000000000 R12: dffffc0000000000 [ 1392.118103] R13: ffff8880a086f720 R14: ffff8880a086f6a0 R15: fffffffffffffff4 [ 1392.128122] FS: 00007f4b78910700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1392.140201] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1392.147300] CR2: 0000000000970004 CR3: 000000009d4f9000 CR4: 00000000001406e0 [ 1392.155255] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1392.163282] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1392.171422] Kernel panic - not syncing: Fatal exception [ 1392.178135] Kernel Offset: disabled [ 1392.182530] Rebooting in 86400 seconds..