00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(`qH\x00', 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f00000021c0)="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", 0x2000, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x150, 0x0, 0x0, [{{0xa, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0x8, 0x0, 'group_id'}}, {{0x6, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, {0x0, 0x0, 0x8, 0x0, 'group_id'}}]}, 0x0, 0x0}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents(r2, 0x0, 0x0) 14:45:15 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x11, 0x64, &(0x7f0000000000)="8d8a4ea6", 0x4) 14:45:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x11, 0x66, &(0x7f0000000000)="8d8a4ea6", 0x4) 14:45:15 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00'}) [ 393.886677] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:15 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0xee01, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:45:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{}, {0x1, @broadcast}, 0x2, {}, 'gretap0\x00'}) 14:45:15 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000003540)) 14:45:15 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:15 executing program 2: socket$inet(0x2, 0x80003, 0x8) 14:45:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 14:45:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) [ 394.575454] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast1}, {@in6=@ipv4={[], [], @empty}, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 14:45:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a1, &(0x7f0000000140)={'gre0\x00', 0x0}) 14:45:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 14:45:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0) 14:45:16 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000000)={@multicast, @link_local, @val={@void}, {@mpls_uc={0x8847, {[], @generic='g\a'}}}}, 0x0) 14:45:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x64010102, @empty}, 0xc) 14:45:16 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/4096) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000001c0)=""/46) r1 = getuid() r2 = getpid() r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r3, 0x8040ae69, &(0x7f00000000c0)={0x0, 0xffffffff, 0x8, 0x1, 0x9}) syz_open_procfs$namespace(r2, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="d10300000000000002004e21ac1414bb00000000000000000000000000000000050000000000000000150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/144], 0x90) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x2, r1, 0xffffffffffffffff, 0xee01, 0xee00, 0x14, 0x20}, 0x0, 0x0, 0x10000, 0x9, 0x655, 0x3, 0x6f55, 0x6, 0x1000, 0x1000, r2}) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89a0, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 14:45:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 14:45:16 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000540)='devlink\x00') [ 395.438763] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:16 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x8) write$binfmt_script(r0, 0x0, 0x0) 14:45:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) 14:45:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000180), 0x4) 14:45:16 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/dlm-monitor\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x80003, 0x8) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5411, &(0x7f0000000200)) 14:45:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8904, 0x0) 14:45:17 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xa04c0, 0x0) 14:45:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) [ 395.671434] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getpeername$packet(r0, 0x0, 0x0) 14:45:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000180)=""/25, 0x19, 0x0, 0x0, 0x0) 14:45:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c00000000000000", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:17 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000340)=""/4096) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000001c0)=""/46) getuid() getpid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x0, 0xffffffff, 0x8, 0x1, 0x9}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89a0, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 14:45:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, 0x8}}, 0x50}}, 0x0) 14:45:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) 14:45:17 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x2, 0x0, 0xf0ff7f}, 0x200001cc, &(0x7f0000000280)={0x0}}, 0x0) 14:45:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=ANY=[@ANYBLOB="50000000140001"], 0x50}}, 0x0) recvmmsg(r0, &(0x7f00000044c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 14:45:17 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) [ 395.921523] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x11, 0x68, &(0x7f0000000000)="8d8a4ea6", 0x4) 14:45:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 14:45:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}, {@in6=@ipv4={[], [], @empty}}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 14:45:17 executing program 3: syz_emit_ethernet(0xe81, &(0x7f0000000180)={@local, @remote, @val={@void}, {@mpls_mc={0x8848, {[], @ipv6=@dccp_packet={0x0, 0x6, "8712c7", 0xe47, 0x21, 0x0, @loopback, @mcast2, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b35545", 0x0, "c3c085"}, "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"}}}}}}}, 0x0) 14:45:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 14:45:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x8}, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 14:45:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x890b, &(0x7f0000000140)={'gre0\x00', 0x0}) 14:45:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 14:45:17 executing program 3: pselect6(0x92, &(0x7f0000000080), 0x0, &(0x7f0000000100), &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 396.167250] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast1}}, 0x1}, 0x90) 14:45:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x12, &(0x7f0000000000)="8d", 0x1) 14:45:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}}) 14:45:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@delpolicy={0x64, 0x14, 0x1, 0x0, 0x0, {{@in6=@private0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, [@XFRMA_IF_ID={0x8}, @policy_type={0xa}]}, 0x64}}, 0x0) 14:45:18 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xac440, 0x0) 14:45:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 396.981233] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:18 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xfffffffffffffbff) 14:45:18 executing program 2: 14:45:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}}) 14:45:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000140)={'gre0\x00', 0x0}) [ 397.047394] audit: type=1800 audit(1606920318.383:104): pid=16576 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16833 res=0 14:45:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:18 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) [ 397.148468] audit: type=1800 audit(1606920318.383:105): pid=16576 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16833 res=0 14:45:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f0000000000)="8d", 0x1) 14:45:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) 14:45:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:18 executing program 2: read$alg(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001000)='team\x00') syz_open_procfs(0xffffffffffffffff, 0x0) syz_mount_image$gfs2meta(&(0x7f0000001240)='gfs2meta\x00', &(0x7f0000001280)='./file0\x00', 0x0, 0x0, &(0x7f0000002740), 0x12000b, &(0x7f0000002800)={[{')#'}]}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 14:45:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=ANY=[@ANYBLOB="50000000140001"], 0x50}}, 0x0) recvmmsg(r0, &(0x7f00000044c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:45:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8993, &(0x7f0000000140)={'gre0\x00', 0x0}) [ 397.425569] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89b1, &(0x7f0000000140)={'gre0\x00', 0x0}) 14:45:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:18 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept(r0, 0x0, 0x0) 14:45:18 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x10001, 0x1a8040) syz_genetlink_get_family_id$mptcp(&(0x7f0000000880)='mptcp_pm\x00') syz_open_procfs(0x0, 0x0) 14:45:18 executing program 0: 14:45:19 executing program 2: 14:45:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 397.659624] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:19 executing program 3: 14:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:19 executing program 0: 14:45:19 executing program 2: 14:45:19 executing program 4: 14:45:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:19 executing program 3: 14:45:19 executing program 4: 14:45:19 executing program 2: 14:45:19 executing program 0: [ 397.903353] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:19 executing program 3: 14:45:19 executing program 4: 14:45:19 executing program 2: 14:45:19 executing program 0: 14:45:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:19 executing program 2: 14:45:19 executing program 0: 14:45:19 executing program 3: 14:45:19 executing program 2: [ 398.152772] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:19 executing program 4: 14:45:19 executing program 1: 14:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:19 executing program 0: 14:45:19 executing program 3: 14:45:19 executing program 4: 14:45:19 executing program 2: 14:45:19 executing program 1: 14:45:19 executing program 0: 14:45:19 executing program 4: 14:45:19 executing program 3: [ 398.419239] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:19 executing program 2: 14:45:19 executing program 1: 14:45:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:19 executing program 3: 14:45:19 executing program 4: 14:45:19 executing program 0: 14:45:19 executing program 1: 14:45:19 executing program 2: 14:45:20 executing program 0: 14:45:20 executing program 4: [ 398.627754] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:45:20 executing program 3: 14:45:20 executing program 1: 14:45:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:20 executing program 3: 14:45:20 executing program 4: 14:45:20 executing program 1: 14:45:20 executing program 2: 14:45:20 executing program 0: [ 398.820237] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:45:20 executing program 4: 14:45:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:20 executing program 1: 14:45:20 executing program 3: 14:45:20 executing program 4: 14:45:20 executing program 2: 14:45:20 executing program 0: 14:45:20 executing program 3: 14:45:20 executing program 1: 14:45:20 executing program 4: [ 399.021952] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:45:20 executing program 2: 14:45:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 14:45:20 executing program 0: 14:45:20 executing program 1: 14:45:20 executing program 2: 14:45:20 executing program 3: 14:45:20 executing program 4: 14:45:20 executing program 1: 14:45:20 executing program 0: 14:45:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 14:45:20 executing program 2: 14:45:20 executing program 3: 14:45:20 executing program 4: 14:45:20 executing program 1: 14:45:20 executing program 2: 14:45:20 executing program 3: 14:45:20 executing program 1: 14:45:20 executing program 0: 14:45:20 executing program 4: 14:45:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 14:45:20 executing program 4: 14:45:20 executing program 2: 14:45:21 executing program 3: 14:45:21 executing program 1: 14:45:21 executing program 0: 14:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)) 14:45:21 executing program 4: 14:45:21 executing program 2: 14:45:21 executing program 3: 14:45:21 executing program 1: add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 14:45:21 executing program 0: 14:45:21 executing program 4: 14:45:21 executing program 2: 14:45:21 executing program 3: 14:45:21 executing program 0: 14:45:21 executing program 1: [ 399.946519] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 14:45:21 executing program 4: 14:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)) 14:45:21 executing program 2: 14:45:21 executing program 0: 14:45:21 executing program 3: 14:45:21 executing program 1: 14:45:21 executing program 2: 14:45:21 executing program 4: 14:45:21 executing program 3: 14:45:21 executing program 0: 14:45:21 executing program 1: 14:45:21 executing program 2: 14:45:21 executing program 4: [ 400.246830] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 14:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)) 14:45:21 executing program 1: 14:45:21 executing program 2: 14:45:21 executing program 4: 14:45:21 executing program 3: 14:45:21 executing program 0: 14:45:21 executing program 1: 14:45:21 executing program 2: 14:45:21 executing program 4: 14:45:21 executing program 0: 14:45:21 executing program 3: [ 400.497535] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 14:45:21 executing program 2: 14:45:21 executing program 1: 14:45:21 executing program 4: 14:45:21 executing program 3: 14:45:22 executing program 0: 14:45:22 executing program 1: 14:45:22 executing program 2: 14:45:22 executing program 0: 14:45:22 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) connect$ax25(r0, 0x0, 0x0) 14:45:22 executing program 3: 14:45:22 executing program 2: 14:45:22 executing program 1: 14:45:22 executing program 5: 14:45:22 executing program 0: 14:45:22 executing program 3: 14:45:22 executing program 4: 14:45:22 executing program 2: 14:45:22 executing program 1: 14:45:22 executing program 5: 14:45:22 executing program 0: 14:45:22 executing program 3: 14:45:22 executing program 4: 14:45:22 executing program 2: 14:45:22 executing program 1: 14:45:22 executing program 5: 14:45:22 executing program 3: 14:45:22 executing program 0: 14:45:22 executing program 4: 14:45:22 executing program 2: 14:45:22 executing program 1: 14:45:22 executing program 5: 14:45:22 executing program 3: 14:45:22 executing program 0: 14:45:22 executing program 2: 14:45:22 executing program 1: 14:45:22 executing program 4: 14:45:22 executing program 5: 14:45:22 executing program 3: 14:45:22 executing program 1: 14:45:22 executing program 0: 14:45:22 executing program 2: 14:45:22 executing program 4: 14:45:22 executing program 5: 14:45:22 executing program 3: 14:45:22 executing program 1: 14:45:22 executing program 2: 14:45:22 executing program 0: 14:45:23 executing program 3: 14:45:23 executing program 4: 14:45:23 executing program 0: 14:45:23 executing program 2: 14:45:23 executing program 5: 14:45:23 executing program 3: 14:45:23 executing program 1: 14:45:23 executing program 2: 14:45:23 executing program 5: 14:45:23 executing program 4: 14:45:23 executing program 3: 14:45:23 executing program 0: 14:45:23 executing program 1: 14:45:23 executing program 5: 14:45:23 executing program 3: 14:45:23 executing program 2: 14:45:23 executing program 0: 14:45:23 executing program 4: 14:45:23 executing program 5: 14:45:23 executing program 1: 14:45:23 executing program 3: 14:45:23 executing program 2: 14:45:23 executing program 5: 14:45:23 executing program 0: 14:45:23 executing program 4: 14:45:23 executing program 1: 14:45:23 executing program 5: 14:45:23 executing program 3: 14:45:23 executing program 2: 14:45:23 executing program 1: 14:45:23 executing program 0: 14:45:23 executing program 4: 14:45:23 executing program 3: 14:45:23 executing program 5: 14:45:23 executing program 4: 14:45:23 executing program 2: 14:45:23 executing program 5: 14:45:23 executing program 1: 14:45:23 executing program 4: 14:45:23 executing program 3: 14:45:23 executing program 0: 14:45:23 executing program 5: 14:45:23 executing program 1: 14:45:24 executing program 3: 14:45:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x40206, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffffff76) r2 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000080)={0xfff, 0x0, 0x0, 0x657f, 0x0, "b2d13908983cb330"}) ioctl$TCSETSF(r1, 0x5412, 0x0) 14:45:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:24 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff0b0080"], 0x52) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 14:45:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x40206, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffffff76) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)={0xfff, 0x0, 0x0, 0x657f, 0x0, "b2d13908983cb330"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00\x00\x000\x00'}) 14:45:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 402.759855] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 402.787344] EXT4-fs (loop2): group descriptors corrupted! [ 402.804219] 9pnet: Insufficient options for proto=fd 14:45:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x40206, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffffff76) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00\x00\x000\x00'}) 14:45:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 403.075456] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 403.084678] EXT4-fs (loop2): group descriptors corrupted! 14:45:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 403.400774] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) 14:45:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) [ 403.447638] EXT4-fs (loop2): group descriptors corrupted! 14:45:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x52, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}]}}}}}}}}, 0x0) 14:45:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) 14:45:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x52, &(0x7f0000000200)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}]}}}}}}}}, 0x0) 14:45:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x40206, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffffff76) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00\x00\x000\x00'}) 14:45:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) 14:45:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000180)=ANY=[], 0x45) sendfile(r0, r1, 0x0, 0x8400fffffffa) 14:45:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:27 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 405.824679] FAT-fs (loop4): bogus number of reserved sectors [ 405.838942] FAT-fs (loop4): Can't find a valid FAT filesystem [ 405.897409] audit: type=1804 audit(1606920327.233:106): pid=17097 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir418480095/syzkaller.O7pvxb/455/file1/bus" dev="sda1" ino=15760 res=1 14:45:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:27 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 405.942023] FAULT_INJECTION: forcing a failure. [ 405.942023] name failslab, interval 1, probability 0, space 0, times 1 [ 405.988357] CPU: 1 PID: 17101 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 405.996274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.005634] Call Trace: [ 406.008232] dump_stack+0x1fc/0x2fe [ 406.011868] should_fail.cold+0xa/0x14 [ 406.015763] ? setup_fault_attr+0x200/0x200 [ 406.020085] ? lock_acquire+0x170/0x3c0 [ 406.024075] __should_failslab+0x115/0x180 [ 406.028318] should_failslab+0x5/0xf [ 406.032029] __kmalloc+0x2ab/0x3c0 [ 406.035567] ? __se_sys_memfd_create+0xf8/0x440 [ 406.040252] __se_sys_memfd_create+0xf8/0x440 [ 406.044754] ? memfd_file_seals_ptr+0x150/0x150 [ 406.049440] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.054811] ? trace_hardirqs_off_caller+0x6e/0x210 [ 406.059826] ? do_syscall_64+0x21/0x620 [ 406.063803] do_syscall_64+0xf9/0x620 [ 406.067604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.072802] RIP: 0033:0x45deb9 [ 406.075990] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.094910] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 406.102619] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 406.109884] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 406.117151] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 406.124419] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 406.131708] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:45:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 406.186389] FAULT_INJECTION: forcing a failure. [ 406.186389] name failslab, interval 1, probability 0, space 0, times 1 [ 406.206637] CPU: 1 PID: 17112 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 406.214556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.223918] Call Trace: [ 406.226520] dump_stack+0x1fc/0x2fe [ 406.230163] should_fail.cold+0xa/0x14 [ 406.234066] ? setup_fault_attr+0x200/0x200 [ 406.238394] ? lock_acquire+0x170/0x3c0 [ 406.242390] __should_failslab+0x115/0x180 [ 406.246625] should_failslab+0x5/0xf [ 406.250337] kmem_cache_alloc_node+0x245/0x3b0 [ 406.254928] __alloc_skb+0x71/0x560 [ 406.258595] netlink_sendmsg+0x9ee/0xc40 [ 406.262681] ? aa_af_perm+0x230/0x230 [ 406.266487] ? nlmsg_notify+0x1a0/0x1a0 [ 406.270463] ? kernel_recvmsg+0x220/0x220 [ 406.274621] ? nlmsg_notify+0x1a0/0x1a0 [ 406.278701] sock_sendmsg+0xc3/0x120 [ 406.282425] ___sys_sendmsg+0x7bb/0x8e0 [ 406.286403] ? check_preemption_disabled+0x41/0x280 [ 406.291422] ? copy_msghdr_from_user+0x440/0x440 [ 406.296180] ? __fget+0x32f/0x510 [ 406.299647] ? lock_downgrade+0x720/0x720 [ 406.303793] ? check_preemption_disabled+0x41/0x280 [ 406.308828] ? check_preemption_disabled+0x41/0x280 [ 406.313851] ? __fget+0x356/0x510 [ 406.317307] ? do_dup2+0x450/0x450 [ 406.320845] ? lock_downgrade+0x720/0x720 [ 406.324993] ? vfs_write+0x3d7/0x540 [ 406.328726] ? __fdget+0x1d0/0x230 [ 406.332271] __x64_sys_sendmsg+0x132/0x220 [ 406.336510] ? __sys_sendmsg+0x1b0/0x1b0 [ 406.340572] ? vfs_write+0x393/0x540 [ 406.344321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.349690] ? trace_hardirqs_off_caller+0x6e/0x210 [ 406.354707] ? do_syscall_64+0x21/0x620 [ 406.358688] do_syscall_64+0xf9/0x620 [ 406.362492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.367692] RIP: 0033:0x45deb9 [ 406.370886] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.390055] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 406.397768] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 406.405039] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 406.412317] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 406.419585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 406.426855] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c 14:45:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:30 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:30 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:30 executing program 5 (fault-call:9 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 408.880004] FAULT_INJECTION: forcing a failure. [ 408.880004] name failslab, interval 1, probability 0, space 0, times 0 [ 408.899236] CPU: 0 PID: 17143 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 408.900858] FAULT_INJECTION: forcing a failure. [ 408.900858] name failslab, interval 1, probability 0, space 0, times 0 [ 408.907168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.907174] Call Trace: [ 408.907194] dump_stack+0x1fc/0x2fe [ 408.907218] should_fail.cold+0xa/0x14 [ 408.937914] ? setup_fault_attr+0x200/0x200 [ 408.942227] ? lock_acquire+0x170/0x3c0 [ 408.946214] __should_failslab+0x115/0x180 [ 408.950440] should_failslab+0x5/0xf [ 408.954149] kmem_cache_alloc+0x277/0x370 [ 408.958286] ? shmem_destroy_callback+0xb0/0xb0 [ 408.962945] shmem_alloc_inode+0x18/0x40 [ 408.967013] ? shmem_destroy_callback+0xb0/0xb0 [ 408.971683] alloc_inode+0x5d/0x180 [ 408.975300] new_inode+0x1d/0xf0 [ 408.978652] shmem_get_inode+0x96/0x8d0 [ 408.982617] __shmem_file_setup.part.0+0x7a/0x2b0 [ 408.987468] shmem_file_setup+0x61/0x90 [ 408.991443] __se_sys_memfd_create+0x26b/0x440 [ 408.996037] ? memfd_file_seals_ptr+0x150/0x150 [ 409.000700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.006086] ? trace_hardirqs_off_caller+0x6e/0x210 [ 409.011198] ? do_syscall_64+0x21/0x620 [ 409.015167] do_syscall_64+0xf9/0x620 [ 409.018960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.024138] RIP: 0033:0x45deb9 [ 409.027341] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.046230] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 409.053942] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 409.061210] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 409.068469] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 14:45:30 executing program 1: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 409.075726] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 409.082986] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 409.090354] CPU: 1 PID: 17145 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 409.098278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.107637] Call Trace: [ 409.110231] dump_stack+0x1fc/0x2fe [ 409.113870] should_fail.cold+0xa/0x14 [ 409.117771] ? setup_fault_attr+0x200/0x200 [ 409.122103] ? lock_acquire+0x170/0x3c0 [ 409.126096] __should_failslab+0x115/0x180 14:45:30 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 409.130349] should_failslab+0x5/0xf [ 409.134071] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 409.139185] __kmalloc_node_track_caller+0x38/0x70 [ 409.144125] __alloc_skb+0xae/0x560 [ 409.147765] netlink_sendmsg+0x9ee/0xc40 [ 409.151837] ? aa_af_perm+0x230/0x230 [ 409.155643] ? nlmsg_notify+0x1a0/0x1a0 [ 409.159624] ? kernel_recvmsg+0x220/0x220 [ 409.163789] ? nlmsg_notify+0x1a0/0x1a0 [ 409.167774] sock_sendmsg+0xc3/0x120 [ 409.172449] ___sys_sendmsg+0x7bb/0x8e0 [ 409.172967] FAULT_INJECTION: forcing a failure. [ 409.172967] name failslab, interval 1, probability 0, space 0, times 0 [ 409.176423] ? check_preemption_disabled+0x41/0x280 [ 409.176442] ? copy_msghdr_from_user+0x440/0x440 [ 409.176457] ? __fget+0x32f/0x510 [ 409.176477] ? lock_downgrade+0x720/0x720 [ 409.204967] ? check_preemption_disabled+0x41/0x280 [ 409.209981] ? check_preemption_disabled+0x41/0x280 [ 409.214991] ? __fget+0x356/0x510 [ 409.218438] ? do_dup2+0x450/0x450 [ 409.221972] ? lock_downgrade+0x720/0x720 [ 409.226115] ? vfs_write+0x3d7/0x540 [ 409.229824] ? __fdget+0x1d0/0x230 [ 409.233363] __x64_sys_sendmsg+0x132/0x220 [ 409.237585] ? __sys_sendmsg+0x1b0/0x1b0 [ 409.241637] ? vfs_write+0x393/0x540 [ 409.245353] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.250704] ? trace_hardirqs_off_caller+0x6e/0x210 [ 409.255707] ? do_syscall_64+0x21/0x620 [ 409.259668] do_syscall_64+0xf9/0x620 [ 409.263457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.268633] RIP: 0033:0x45deb9 [ 409.271814] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.290712] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 409.298421] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 409.305678] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 409.313021] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 409.320279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.327535] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c [ 409.334839] CPU: 0 PID: 17151 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 409.342726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.352083] Call Trace: [ 409.354683] dump_stack+0x1fc/0x2fe [ 409.358344] should_fail.cold+0xa/0x14 [ 409.362242] ? setup_fault_attr+0x200/0x200 [ 409.366572] ? lock_acquire+0x170/0x3c0 [ 409.370559] __should_failslab+0x115/0x180 [ 409.374802] should_failslab+0x5/0xf [ 409.378555] kmem_cache_alloc+0x277/0x370 [ 409.382714] __d_alloc+0x2b/0xa10 [ 409.386172] d_alloc_pseudo+0x19/0x70 [ 409.389975] alloc_file_pseudo+0xc6/0x250 [ 409.394128] ? alloc_file+0x4d0/0x4d0 [ 409.397944] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 409.403576] ? shmem_get_inode+0x44c/0x8d0 [ 409.408084] __shmem_file_setup.part.0+0x102/0x2b0 [ 409.413022] shmem_file_setup+0x61/0x90 [ 409.417008] __se_sys_memfd_create+0x26b/0x440 [ 409.421600] ? memfd_file_seals_ptr+0x150/0x150 [ 409.426275] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.431644] ? trace_hardirqs_off_caller+0x6e/0x210 [ 409.436668] ? do_syscall_64+0x21/0x620 [ 409.441182] do_syscall_64+0xf9/0x620 [ 409.444999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.450195] RIP: 0033:0x45deb9 [ 409.453407] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.472573] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:45:30 executing program 1: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:30 executing program 1: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:30 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 409.480286] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 409.487649] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 409.494932] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 409.502208] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 409.509485] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 409.561872] FAULT_INJECTION: forcing a failure. [ 409.561872] name failslab, interval 1, probability 0, space 0, times 0 [ 409.577950] CPU: 1 PID: 17164 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 409.585855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.595210] Call Trace: [ 409.597792] dump_stack+0x1fc/0x2fe [ 409.601412] should_fail.cold+0xa/0x14 [ 409.605405] ? setup_fault_attr+0x200/0x200 [ 409.609725] ? lock_downgrade+0x720/0x720 [ 409.613873] ? check_preemption_disabled+0x41/0x280 [ 409.618877] __should_failslab+0x115/0x180 [ 409.623108] should_failslab+0x5/0xf [ 409.626832] kmem_cache_alloc+0x3f/0x370 [ 409.630894] skb_clone+0x151/0x3d0 [ 409.634434] netlink_deliver_tap+0x955/0xb00 [ 409.638834] netlink_unicast+0x545/0x690 [ 409.642886] ? netlink_sendskb+0x110/0x110 [ 409.647139] ? _copy_from_iter_full+0x229/0x7c0 [ 409.652165] ? __phys_addr_symbol+0x2c/0x70 [ 409.656487] ? __check_object_size+0x17b/0x3d1 [ 409.661064] netlink_sendmsg+0x6bb/0xc40 [ 409.665133] ? aa_af_perm+0x230/0x230 [ 409.668923] ? nlmsg_notify+0x1a0/0x1a0 [ 409.672881] ? kernel_recvmsg+0x220/0x220 [ 409.677036] ? nlmsg_notify+0x1a0/0x1a0 [ 409.680997] sock_sendmsg+0xc3/0x120 [ 409.684697] ___sys_sendmsg+0x7bb/0x8e0 [ 409.688662] ? check_preemption_disabled+0x41/0x280 [ 409.694630] ? copy_msghdr_from_user+0x440/0x440 [ 409.699370] ? __fget+0x32f/0x510 [ 409.702809] ? lock_downgrade+0x720/0x720 [ 409.706939] ? check_preemption_disabled+0x41/0x280 [ 409.712031] ? check_preemption_disabled+0x41/0x280 [ 409.717032] ? __fget+0x356/0x510 [ 409.720468] ? do_dup2+0x450/0x450 [ 409.723991] ? lock_downgrade+0x720/0x720 [ 409.728143] ? vfs_write+0x3d7/0x540 [ 409.731846] ? __fdget+0x1d0/0x230 [ 409.735407] __x64_sys_sendmsg+0x132/0x220 [ 409.739639] ? __sys_sendmsg+0x1b0/0x1b0 [ 409.743701] ? vfs_write+0x393/0x540 [ 409.747419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.752855] ? trace_hardirqs_off_caller+0x6e/0x210 [ 409.757870] ? do_syscall_64+0x21/0x620 [ 409.761836] do_syscall_64+0xf9/0x620 [ 409.765642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.770818] RIP: 0033:0x45deb9 [ 409.773994] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.792888] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 409.800597] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 409.807856] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 409.815116] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 409.822369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 409.829620] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c 14:45:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:33 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:33 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:33 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:33 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 411.927752] FAULT_INJECTION: forcing a failure. [ 411.927752] name failslab, interval 1, probability 0, space 0, times 0 [ 411.942777] CPU: 1 PID: 17185 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 411.950857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.960219] Call Trace: [ 411.962824] dump_stack+0x1fc/0x2fe [ 411.966465] should_fail.cold+0xa/0x14 [ 411.970383] ? setup_fault_attr+0x200/0x200 [ 411.974157] FAULT_INJECTION: forcing a failure. [ 411.974157] name failslab, interval 1, probability 0, space 0, times 0 [ 411.974705] ? lock_acquire+0x170/0x3c0 [ 411.974733] __should_failslab+0x115/0x180 [ 411.994096] should_failslab+0x5/0xf [ 411.997806] kmem_cache_alloc_node+0x245/0x3b0 [ 412.002395] __alloc_skb+0x71/0x560 [ 412.006017] netlink_ack+0x27d/0xae0 [ 412.009742] ? netlink_sendmsg+0xc40/0xc40 [ 412.013969] ? __mutex_lock+0x3a8/0x1260 [ 412.018019] ? kfree_skbmem+0x140/0x140 [ 412.021980] netlink_rcv_skb+0x353/0x440 [ 412.026033] ? xfrm_dump_sa_done+0xe0/0xe0 [ 412.030269] ? netlink_ack+0xae0/0xae0 [ 412.034162] ? netlink_deliver_tap+0x22d/0xb00 [ 412.038743] ? lock_downgrade+0x720/0x720 [ 412.042972] xfrm_netlink_rcv+0x6b/0x90 [ 412.046935] netlink_unicast+0x4d5/0x690 [ 412.050988] ? netlink_sendskb+0x110/0x110 [ 412.055214] ? _copy_from_iter_full+0x229/0x7c0 [ 412.059870] ? __phys_addr_symbol+0x2c/0x70 [ 412.064201] ? __check_object_size+0x17b/0x3d1 [ 412.068788] netlink_sendmsg+0x6bb/0xc40 [ 412.072841] ? aa_af_perm+0x230/0x230 [ 412.076627] ? nlmsg_notify+0x1a0/0x1a0 [ 412.080603] ? kernel_recvmsg+0x220/0x220 [ 412.084748] ? nlmsg_notify+0x1a0/0x1a0 [ 412.088719] sock_sendmsg+0xc3/0x120 [ 412.092423] ___sys_sendmsg+0x7bb/0x8e0 [ 412.096400] ? check_preemption_disabled+0x41/0x280 [ 412.101410] ? copy_msghdr_from_user+0x440/0x440 [ 412.106157] ? __fget+0x32f/0x510 [ 412.109615] ? lock_downgrade+0x720/0x720 [ 412.113749] ? check_preemption_disabled+0x41/0x280 [ 412.118751] ? check_preemption_disabled+0x41/0x280 [ 412.123761] ? __fget+0x356/0x510 [ 412.127209] ? do_dup2+0x450/0x450 [ 412.131096] ? lock_downgrade+0x720/0x720 [ 412.135246] ? vfs_write+0x3d7/0x540 [ 412.138949] ? __fdget+0x1d0/0x230 [ 412.142482] __x64_sys_sendmsg+0x132/0x220 [ 412.146706] ? __sys_sendmsg+0x1b0/0x1b0 [ 412.150759] ? vfs_write+0x393/0x540 [ 412.154490] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.159852] ? trace_hardirqs_off_caller+0x6e/0x210 [ 412.164863] ? do_syscall_64+0x21/0x620 [ 412.168828] do_syscall_64+0xf9/0x620 [ 412.173400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.178582] RIP: 0033:0x45deb9 [ 412.181761] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.200650] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.208356] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 412.215708] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 412.222965] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 412.230223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 412.237485] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c [ 412.244764] CPU: 0 PID: 17193 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 412.252661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.262053] Call Trace: [ 412.264658] dump_stack+0x1fc/0x2fe [ 412.268309] should_fail.cold+0xa/0x14 [ 412.272219] ? setup_fault_attr+0x200/0x200 [ 412.276549] ? lock_acquire+0x170/0x3c0 [ 412.280541] __should_failslab+0x115/0x180 [ 412.284782] should_failslab+0x5/0xf [ 412.288497] kmem_cache_alloc+0x277/0x370 [ 412.292663] __alloc_file+0x21/0x330 [ 412.296474] alloc_empty_file+0x6d/0x170 [ 412.300549] alloc_file+0x5e/0x4d0 [ 412.304102] alloc_file_pseudo+0x165/0x250 [ 412.308349] ? alloc_file+0x4d0/0x4d0 [ 412.312162] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 412.317799] ? shmem_get_inode+0x44c/0x8d0 [ 412.322052] __shmem_file_setup.part.0+0x102/0x2b0 [ 412.322615] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) [ 412.327002] shmem_file_setup+0x61/0x90 [ 412.327023] __se_sys_memfd_create+0x26b/0x440 [ 412.327041] ? memfd_file_seals_ptr+0x150/0x150 [ 412.327053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.327072] ? trace_hardirqs_off_caller+0x6e/0x210 [ 412.359382] ? do_syscall_64+0x21/0x620 [ 412.363386] do_syscall_64+0xf9/0x620 [ 412.367204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.372416] RIP: 0033:0x45deb9 14:45:33 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:33 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 412.375630] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.394542] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 412.402264] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 412.409543] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 412.416821] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 14:45:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:33 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 412.424102] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 412.431479] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 412.440981] FAULT_INJECTION: forcing a failure. [ 412.440981] name failslab, interval 1, probability 0, space 0, times 0 [ 412.452515] CPU: 1 PID: 17203 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 412.460408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.469768] Call Trace: [ 412.472373] dump_stack+0x1fc/0x2fe [ 412.476027] should_fail.cold+0xa/0x14 [ 412.479907] ? setup_fault_attr+0x200/0x200 [ 412.484212] ? lock_acquire+0x170/0x3c0 [ 412.488183] __should_failslab+0x115/0x180 [ 412.492401] should_failslab+0x5/0xf [ 412.496092] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 412.501180] __kmalloc_node_track_caller+0x38/0x70 [ 412.506090] __alloc_skb+0xae/0x560 [ 412.509731] netlink_ack+0x27d/0xae0 [ 412.513427] ? netlink_sendmsg+0xc40/0xc40 [ 412.517657] ? __mutex_lock+0x3a8/0x1260 [ 412.521698] ? kfree_skbmem+0x140/0x140 [ 412.525669] netlink_rcv_skb+0x353/0x440 [ 412.529713] ? xfrm_dump_sa_done+0xe0/0xe0 [ 412.533928] ? netlink_ack+0xae0/0xae0 [ 412.537805] ? netlink_deliver_tap+0x22d/0xb00 [ 412.542369] ? lock_downgrade+0x720/0x720 [ 412.546510] xfrm_netlink_rcv+0x6b/0x90 [ 412.550481] netlink_unicast+0x4d5/0x690 [ 412.554533] ? netlink_sendskb+0x110/0x110 [ 412.558749] ? _copy_from_iter_full+0x229/0x7c0 [ 412.563399] ? __phys_addr_symbol+0x2c/0x70 [ 412.567751] ? __check_object_size+0x17b/0x3d1 [ 412.572362] netlink_sendmsg+0x6bb/0xc40 [ 412.576484] ? aa_af_perm+0x230/0x230 [ 412.580273] ? nlmsg_notify+0x1a0/0x1a0 [ 412.584243] ? kernel_recvmsg+0x220/0x220 [ 412.588392] ? nlmsg_notify+0x1a0/0x1a0 [ 412.592370] sock_sendmsg+0xc3/0x120 [ 412.596089] ___sys_sendmsg+0x7bb/0x8e0 [ 412.600193] ? check_preemption_disabled+0x41/0x280 [ 412.605222] ? copy_msghdr_from_user+0x440/0x440 [ 412.609971] ? __fget+0x32f/0x510 [ 412.613426] ? lock_downgrade+0x720/0x720 [ 412.617567] ? check_preemption_disabled+0x41/0x280 [ 412.622567] ? check_preemption_disabled+0x41/0x280 [ 412.627698] ? __fget+0x356/0x510 [ 412.631142] ? do_dup2+0x450/0x450 [ 412.634730] ? lock_downgrade+0x720/0x720 [ 412.638888] ? vfs_write+0x3d7/0x540 [ 412.642602] ? __fdget+0x1d0/0x230 [ 412.646231] __x64_sys_sendmsg+0x132/0x220 [ 412.650462] ? __sys_sendmsg+0x1b0/0x1b0 [ 412.654501] ? vfs_write+0x393/0x540 [ 412.658200] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.663546] ? trace_hardirqs_off_caller+0x6e/0x210 [ 412.668543] ? do_syscall_64+0x21/0x620 [ 412.672500] do_syscall_64+0xf9/0x620 [ 412.676282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.681449] RIP: 0033:0x45deb9 [ 412.684621] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.703502] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.714489] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 412.723836] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 412.731114] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 412.738381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 412.745642] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c 14:45:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 412.823851] FAULT_INJECTION: forcing a failure. [ 412.823851] name failslab, interval 1, probability 0, space 0, times 0 [ 412.863633] CPU: 1 PID: 17207 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 412.871560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.880922] Call Trace: [ 412.883537] dump_stack+0x1fc/0x2fe [ 412.887190] should_fail.cold+0xa/0x14 [ 412.891107] ? setup_fault_attr+0x200/0x200 [ 412.895455] ? lock_acquire+0x170/0x3c0 [ 412.899448] __should_failslab+0x115/0x180 [ 412.903694] should_failslab+0x5/0xf [ 412.907424] kmem_cache_alloc_trace+0x284/0x380 [ 412.910392] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) [ 412.912107] apparmor_file_alloc_security+0x394/0xad0 [ 412.912127] ? apparmor_file_receive+0x160/0x160 [ 412.912145] ? __alloc_file+0x21/0x330 [ 412.934624] security_file_alloc+0x40/0x90 [ 412.938876] __alloc_file+0xc9/0x330 [ 412.942593] alloc_empty_file+0x6d/0x170 [ 412.946645] alloc_file+0x5e/0x4d0 [ 412.950192] alloc_file_pseudo+0x165/0x250 [ 412.954501] ? alloc_file+0x4d0/0x4d0 [ 412.958318] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 412.964091] ? shmem_get_inode+0x44c/0x8d0 [ 412.968336] __shmem_file_setup.part.0+0x102/0x2b0 [ 412.973272] shmem_file_setup+0x61/0x90 [ 412.977286] __se_sys_memfd_create+0x26b/0x440 [ 412.981857] ? memfd_file_seals_ptr+0x150/0x150 [ 412.986525] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.991882] ? trace_hardirqs_off_caller+0x6e/0x210 [ 412.997276] ? do_syscall_64+0x21/0x620 [ 413.001244] do_syscall_64+0xf9/0x620 [ 413.005033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.010215] RIP: 0033:0x45deb9 [ 413.013401] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.032478] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 413.040183] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 413.047454] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 413.054716] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 413.063714] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 413.071094] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:45:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:36 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:36 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x10, 0x0) [ 414.976817] FAULT_INJECTION: forcing a failure. [ 414.976817] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 414.977333] FAULT_INJECTION: forcing a failure. [ 414.977333] name failslab, interval 1, probability 0, space 0, times 0 [ 414.999514] CPU: 1 PID: 17234 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 415.008298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.017665] Call Trace: [ 415.020271] dump_stack+0x1fc/0x2fe [ 415.023924] should_fail.cold+0xa/0x14 [ 415.027823] ? lock_acquire+0x170/0x3c0 [ 415.031809] ? setup_fault_attr+0x200/0x200 [ 415.036153] __alloc_pages_nodemask+0x239/0x2890 [ 415.040922] ? __lock_acquire+0x6de/0x3ff0 [ 415.045171] ? static_obj+0x50/0x50 [ 415.048815] ? __lock_acquire+0x6de/0x3ff0 [ 415.053062] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 415.057930] ? __lock_acquire+0x6de/0x3ff0 [ 415.062164] ? deref_stack_reg+0x134/0x1d0 [ 415.066392] ? mark_held_locks+0xf0/0xf0 [ 415.071054] ? mark_held_locks+0xf0/0xf0 [ 415.075116] ? unwind_next_frame+0x10a9/0x1c60 [ 415.079811] alloc_pages_vma+0xf2/0x780 [ 415.083778] shmem_alloc_page+0x11c/0x1f0 [ 415.087938] ? shmem_swapin+0x220/0x220 [ 415.091931] ? percpu_counter_add_batch+0x126/0x180 [ 415.096949] ? __vm_enough_memory+0x316/0x650 [ 415.101438] shmem_alloc_and_acct_page+0x15a/0x850 [ 415.106374] shmem_getpage_gfp+0x4e9/0x37f0 [ 415.110694] ? shmem_alloc_and_acct_page+0x850/0x850 [ 415.115788] ? mark_held_locks+0xa6/0xf0 [ 415.119835] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 415.125014] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 415.130210] shmem_write_begin+0xff/0x1e0 [ 415.134358] generic_perform_write+0x1f8/0x4d0 [ 415.138944] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 415.143953] ? current_time+0x1c0/0x1c0 [ 415.147943] ? lock_acquire+0x170/0x3c0 [ 415.151920] __generic_file_write_iter+0x24b/0x610 [ 415.156939] generic_file_write_iter+0x3f8/0x729 [ 415.161691] __vfs_write+0x51b/0x770 [ 415.165405] ? kernel_read+0x110/0x110 [ 415.169309] ? check_preemption_disabled+0x41/0x280 [ 415.174327] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.179335] vfs_write+0x1f3/0x540 [ 415.182867] __x64_sys_pwrite64+0x1f7/0x250 [ 415.187176] ? ksys_pwrite64+0x1a0/0x1a0 [ 415.191224] ? trace_hardirqs_off_caller+0x6e/0x210 [ 415.196227] ? do_syscall_64+0x21/0x620 [ 415.200205] do_syscall_64+0xf9/0x620 [ 415.203997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.209363] RIP: 0033:0x417a17 [ 415.212546] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 415.231442] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 415.239161] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417a17 [ 415.246427] RDX: 000000000000010c RSI: 0000000020010000 RDI: 0000000000000004 [ 415.253694] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 415.260965] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 415.268234] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 415.275511] CPU: 0 PID: 17233 Comm: syz-executor.4 Not tainted 4.19.161-syzkaller #0 [ 415.283403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.292761] Call Trace: [ 415.295362] dump_stack+0x1fc/0x2fe [ 415.299007] should_fail.cold+0xa/0x14 [ 415.302972] ? setup_fault_attr+0x200/0x200 [ 415.305487] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (72 blocks) [ 415.307296] ? sk_filter_trim_cap+0x497/0x7d0 [ 415.307324] __should_failslab+0x115/0x180 [ 415.307340] should_failslab+0x5/0xf [ 415.307350] kmem_cache_alloc+0x3f/0x370 [ 415.307365] skb_clone+0x151/0x3d0 [ 415.336095] netlink_deliver_tap+0x955/0xb00 [ 415.340498] netlink_sendskb+0x6c/0x110 [ 415.344458] netlink_unicast+0x5b3/0x690 [ 415.348508] ? netlink_sendskb+0x110/0x110 [ 415.352742] ? memset+0x20/0x40 [ 415.356096] ? __nlmsg_put+0x155/0x1c0 [ 415.359989] netlink_ack+0x628/0xae0 [ 415.363696] ? netlink_sendmsg+0xc40/0xc40 [ 415.367925] ? __mutex_lock+0x3a8/0x1260 [ 415.371984] ? kfree_skbmem+0x140/0x140 [ 415.375944] netlink_rcv_skb+0x353/0x440 [ 415.379993] ? xfrm_dump_sa_done+0xe0/0xe0 [ 415.384213] ? netlink_ack+0xae0/0xae0 [ 415.388094] ? netlink_deliver_tap+0x22d/0xb00 [ 415.392773] ? lock_downgrade+0x720/0x720 [ 415.396912] xfrm_netlink_rcv+0x6b/0x90 [ 415.400876] netlink_unicast+0x4d5/0x690 [ 415.404930] ? netlink_sendskb+0x110/0x110 [ 415.409185] ? _copy_from_iter_full+0x229/0x7c0 [ 415.413838] ? __phys_addr_symbol+0x2c/0x70 [ 415.418148] ? __check_object_size+0x17b/0x3d1 [ 415.422722] netlink_sendmsg+0x6bb/0xc40 [ 415.426772] ? aa_af_perm+0x230/0x230 [ 415.430646] ? nlmsg_notify+0x1a0/0x1a0 [ 415.434610] ? kernel_recvmsg+0x220/0x220 [ 415.438748] ? nlmsg_notify+0x1a0/0x1a0 [ 415.442708] sock_sendmsg+0xc3/0x120 [ 415.446414] ___sys_sendmsg+0x7bb/0x8e0 [ 415.450377] ? check_preemption_disabled+0x41/0x280 [ 415.455391] ? copy_msghdr_from_user+0x440/0x440 [ 415.460135] ? __fget+0x32f/0x510 [ 415.463586] ? lock_downgrade+0x720/0x720 [ 415.467716] ? check_preemption_disabled+0x41/0x280 [ 415.472737] ? check_preemption_disabled+0x41/0x280 [ 415.477752] ? __fget+0x356/0x510 [ 415.481197] ? do_dup2+0x450/0x450 [ 415.484732] ? lock_downgrade+0x720/0x720 [ 415.488864] ? vfs_write+0x3d7/0x540 [ 415.492563] ? __fdget+0x1d0/0x230 [ 415.496092] __x64_sys_sendmsg+0x132/0x220 [ 415.500310] ? __sys_sendmsg+0x1b0/0x1b0 [ 415.504351] ? vfs_write+0x393/0x540 [ 415.508055] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.513414] ? trace_hardirqs_off_caller+0x6e/0x210 [ 415.518418] ? do_syscall_64+0x21/0x620 [ 415.522384] do_syscall_64+0xf9/0x620 [ 415.526172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.531433] RIP: 0033:0x45deb9 [ 415.534610] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.553497] RSP: 002b:00007f814edadc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 415.561202] RAX: ffffffffffffffda RBX: 000000000002e7c0 RCX: 000000000045deb9 [ 415.568467] RDX: 0000000000000000 RSI: 0000000020000b00 RDI: 0000000000000003 [ 415.575732] RBP: 00007f814edadca0 R08: 0000000000000000 R09: 0000000000000000 [ 415.582998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 415.590254] R13: 00007ffe17c6b93f R14: 00007f814edae9c0 R15: 000000000119bf2c 14:45:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:37 executing program 4 (fault-call:1 fault-nth:6): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 415.637236] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 14:45:37 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 415.805544] FAULT_INJECTION: forcing a failure. [ 415.805544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.834549] CPU: 0 PID: 17261 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 415.842464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.851821] Call Trace: 14:45:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 415.854420] dump_stack+0x1fc/0x2fe [ 415.858064] should_fail.cold+0xa/0x14 [ 415.862124] ? lock_acquire+0x170/0x3c0 [ 415.866146] ? setup_fault_attr+0x200/0x200 [ 415.870500] __alloc_pages_nodemask+0x239/0x2890 [ 415.875264] ? __lock_acquire+0x6de/0x3ff0 [ 415.879515] ? __lock_acquire+0x6de/0x3ff0 [ 415.883763] ? __lock_acquire+0x6de/0x3ff0 [ 415.888004] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 415.892869] ? __lock_acquire+0x6de/0x3ff0 [ 415.897116] ? static_obj+0x50/0x50 [ 415.900749] ? mark_held_locks+0xf0/0xf0 [ 415.904815] alloc_pages_vma+0xf2/0x780 [ 415.908795] shmem_alloc_page+0x11c/0x1f0 [ 415.912945] ? shmem_swapin+0x220/0x220 [ 415.916950] ? percpu_counter_add_batch+0x126/0x180 [ 415.922003] ? __vm_enough_memory+0x316/0x650 [ 415.926537] shmem_alloc_and_acct_page+0x15a/0x850 [ 415.931477] shmem_getpage_gfp+0x4e9/0x37f0 [ 415.935821] ? shmem_alloc_and_acct_page+0x850/0x850 [ 415.940930] ? mark_held_locks+0xa6/0xf0 [ 415.944996] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 415.950202] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 415.955399] shmem_write_begin+0xff/0x1e0 [ 415.959559] generic_perform_write+0x1f8/0x4d0 [ 415.964156] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 415.968830] ? current_time+0x1c0/0x1c0 [ 415.972818] ? lock_acquire+0x170/0x3c0 [ 415.976800] __generic_file_write_iter+0x24b/0x610 [ 415.981740] generic_file_write_iter+0x3f8/0x729 [ 415.986515] __vfs_write+0x51b/0x770 [ 415.990246] ? kernel_read+0x110/0x110 [ 415.994149] ? check_preemption_disabled+0x41/0x280 [ 415.999167] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.004189] vfs_write+0x1f3/0x540 [ 416.007718] __x64_sys_pwrite64+0x1f7/0x250 [ 416.012042] ? ksys_pwrite64+0x1a0/0x1a0 [ 416.016111] ? trace_hardirqs_off_caller+0x6e/0x210 [ 416.021124] ? do_syscall_64+0x21/0x620 [ 416.025085] do_syscall_64+0xf9/0x620 [ 416.028869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.034072] RIP: 0033:0x417a17 [ 416.037280] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 416.056175] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 416.063885] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417a17 [ 416.071581] RDX: 000000000000009e RSI: 0000000020011e00 RDI: 0000000000000004 [ 416.079308] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 416.086563] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 416.093846] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 416.115462] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 416.137483] EXT4-fs (loop3): get root inode failed [ 416.142947] EXT4-fs (loop3): mount failed 14:45:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:39 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x10000000, 0x0) [ 418.051995] FAULT_INJECTION: forcing a failure. [ 418.051995] name failslab, interval 1, probability 0, space 0, times 0 [ 418.063504] CPU: 1 PID: 17294 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 418.071478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.080839] Call Trace: [ 418.083525] dump_stack+0x1fc/0x2fe [ 418.087164] should_fail.cold+0xa/0x14 [ 418.091062] ? setup_fault_attr+0x200/0x200 [ 418.095396] ? __lock_acquire+0x6de/0x3ff0 [ 418.099642] __should_failslab+0x115/0x180 [ 418.103888] should_failslab+0x5/0xf [ 418.107606] kmem_cache_alloc+0x3f/0x370 [ 418.111696] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 418.117766] radix_tree_extend+0x191/0x4b0 [ 418.122018] __radix_tree_create+0x448/0x540 [ 418.126447] __radix_tree_insert+0xbb/0x5f0 [ 418.130790] ? __radix_tree_create+0x540/0x540 [ 418.135383] ? lock_acquire+0x170/0x3c0 [ 418.139372] ? shmem_add_to_page_cache+0x306/0xbb0 [ 418.144315] shmem_add_to_page_cache+0x616/0xbb0 [ 418.149073] ? shmem_recalc_inode+0x310/0x310 [ 418.153586] ? __radix_tree_preload+0x1fe/0x280 [ 418.158268] shmem_getpage_gfp+0x2004/0x37f0 [ 418.162701] ? shmem_alloc_and_acct_page+0x850/0x850 [ 418.167812] ? mark_held_locks+0xa6/0xf0 [ 418.171893] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 418.174099] ptrace attach of "/root/syz-executor.0"[17302] was attempted by "/root/syz-executor.0"[17303] [ 418.177095] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 418.194801] shmem_write_begin+0xff/0x1e0 14:45:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00"/81, 0x51, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 418.198965] generic_perform_write+0x1f8/0x4d0 [ 418.203573] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 418.208251] ? current_time+0x1c0/0x1c0 [ 418.212234] ? lock_acquire+0x170/0x3c0 [ 418.216216] __generic_file_write_iter+0x24b/0x610 [ 418.221162] generic_file_write_iter+0x3f8/0x729 [ 418.225932] __vfs_write+0x51b/0x770 [ 418.229666] ? kernel_read+0x110/0x110 [ 418.233572] ? check_preemption_disabled+0x41/0x280 [ 418.236909] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (23534!=61414) [ 418.238601] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.238621] vfs_write+0x1f3/0x540 [ 418.238640] __x64_sys_pwrite64+0x1f7/0x250 [ 418.260332] ? ksys_pwrite64+0x1a0/0x1a0 [ 418.264406] ? trace_hardirqs_off_caller+0x6e/0x210 [ 418.268274] EXT4-fs (loop2): group descriptors corrupted! [ 418.269427] ? do_syscall_64+0x21/0x620 [ 418.269445] do_syscall_64+0xf9/0x620 [ 418.269460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.269474] RIP: 0033:0x417a17 [ 418.291129] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 418.310045] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 418.317755] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417a17 [ 418.325012] RDX: 000000000000009e RSI: 0000000020011e00 RDI: 0000000000000004 [ 418.332471] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 418.339845] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 14:45:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 418.347106] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 14:45:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:39 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 418.392757] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x2, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 418.513975] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 418.537802] FAULT_INJECTION: forcing a failure. [ 418.537802] name failslab, interval 1, probability 0, space 0, times 0 [ 418.568267] CPU: 0 PID: 17339 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 418.576185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.585543] Call Trace: [ 418.588138] dump_stack+0x1fc/0x2fe [ 418.591767] should_fail.cold+0xa/0x14 [ 418.595725] ? setup_fault_attr+0x200/0x200 [ 418.600032] ? lock_acquire+0x170/0x3c0 [ 418.604031] __should_failslab+0x115/0x180 [ 418.608263] should_failslab+0x5/0xf [ 418.611977] kmem_cache_alloc+0x277/0x370 [ 418.616155] getname_flags+0xce/0x590 [ 418.619949] do_sys_open+0x26c/0x520 [ 418.623680] ? filp_open+0x70/0x70 [ 418.627217] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 418.632666] ? trace_hardirqs_off_caller+0x6e/0x210 [ 418.637674] ? do_syscall_64+0x21/0x620 [ 418.641641] do_syscall_64+0xf9/0x620 [ 418.645547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.650921] RIP: 0033:0x4179b1 14:45:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x3, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 418.654097] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 418.672998] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 418.680708] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 418.687971] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fa358562ae0 [ 418.695233] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 418.702510] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 418.709764] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0xfeffffff, 0x0) 14:45:42 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 421.023458] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 421.053089] FAULT_INJECTION: forcing a failure. [ 421.053089] name failslab, interval 1, probability 0, space 0, times 0 [ 421.064598] CPU: 1 PID: 17362 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 421.072494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.081857] Call Trace: [ 421.084457] dump_stack+0x1fc/0x2fe [ 421.088099] should_fail.cold+0xa/0x14 [ 421.092014] ? setup_fault_attr+0x200/0x200 [ 421.096344] ? lock_acquire+0x170/0x3c0 [ 421.100339] __should_failslab+0x115/0x180 [ 421.104580] should_failslab+0x5/0xf [ 421.108299] kmem_cache_alloc+0x277/0x370 [ 421.112461] __alloc_file+0x21/0x330 [ 421.116181] alloc_empty_file+0x6d/0x170 [ 421.120250] path_openat+0xe9/0x2df0 [ 421.123976] ? __lock_acquire+0x6de/0x3ff0 [ 421.128233] ? path_lookupat+0x8d0/0x8d0 [ 421.132300] ? mark_held_locks+0xf0/0xf0 [ 421.136396] ? mark_held_locks+0xf0/0xf0 [ 421.140510] do_filp_open+0x18c/0x3f0 [ 421.144305] ? may_open_dev+0xf0/0xf0 [ 421.148092] ? __alloc_fd+0x28d/0x570 [ 421.151879] ? lock_downgrade+0x720/0x720 [ 421.156014] ? lock_acquire+0x170/0x3c0 [ 421.160060] ? __alloc_fd+0x34/0x570 [ 421.163771] ? do_raw_spin_unlock+0x171/0x230 [ 421.168251] ? _raw_spin_unlock+0x29/0x40 [ 421.172380] ? __alloc_fd+0x28d/0x570 [ 421.176179] do_sys_open+0x3b3/0x520 [ 421.180000] ? filp_open+0x70/0x70 [ 421.183539] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 421.188897] ? trace_hardirqs_off_caller+0x6e/0x210 [ 421.193896] ? do_syscall_64+0x21/0x620 [ 421.197875] do_syscall_64+0xf9/0x620 [ 421.201669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.206838] RIP: 0033:0x4179b1 [ 421.210014] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 421.228902] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 421.236593] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 421.244811] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fa358562ae0 [ 421.252946] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 421.260198] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 421.267448] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x4, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) 14:45:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:42 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x7, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) [ 421.412899] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 421.415956] FAULT_INJECTION: forcing a failure. [ 421.415956] name failslab, interval 1, probability 0, space 0, times 0 [ 421.437501] CPU: 0 PID: 17387 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 421.445411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.454770] Call Trace: [ 421.457370] dump_stack+0x1fc/0x2fe 14:45:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x8, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 421.461012] should_fail.cold+0xa/0x14 [ 421.464912] ? setup_fault_attr+0x200/0x200 [ 421.469274] ? lock_acquire+0x170/0x3c0 [ 421.473299] __should_failslab+0x115/0x180 [ 421.477516] should_failslab+0x5/0xf [ 421.481220] kmem_cache_alloc+0x277/0x370 [ 421.485419] __alloc_file+0x21/0x330 [ 421.489119] alloc_empty_file+0x6d/0x170 [ 421.493193] path_openat+0xe9/0x2df0 [ 421.496896] ? __lock_acquire+0x6de/0x3ff0 [ 421.501138] ? path_lookupat+0x8d0/0x8d0 [ 421.505202] ? mark_held_locks+0xf0/0xf0 [ 421.509252] do_filp_open+0x18c/0x3f0 [ 421.513051] ? may_open_dev+0xf0/0xf0 [ 421.516876] ? __alloc_fd+0x28d/0x570 [ 421.520677] ? lock_downgrade+0x720/0x720 [ 421.524817] ? lock_acquire+0x170/0x3c0 [ 421.528775] ? __alloc_fd+0x34/0x570 [ 421.532491] ? do_raw_spin_unlock+0x171/0x230 [ 421.537940] ? _raw_spin_unlock+0x29/0x40 [ 421.542084] ? __alloc_fd+0x28d/0x570 [ 421.545882] do_sys_open+0x3b3/0x520 [ 421.549610] ? filp_open+0x70/0x70 [ 421.553140] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 421.558577] ? trace_hardirqs_off_caller+0x6e/0x210 [ 421.563585] ? do_syscall_64+0x21/0x620 [ 421.567546] do_syscall_64+0xf9/0x620 [ 421.571360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.576542] RIP: 0033:0x4179b1 [ 421.579909] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 421.598812] RSP: 002b:00007fa358562a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:45:43 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 421.606748] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 421.614169] RDX: 000000000000009e RSI: 0000000000000002 RDI: 00007fa358562ae0 [ 421.621438] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 421.628714] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 [ 421.636427] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 421.756989] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 421.790670] FAULT_INJECTION: forcing a failure. [ 421.790670] name failslab, interval 1, probability 0, space 0, times 0 [ 421.803180] CPU: 0 PID: 17403 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 421.811071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.820425] Call Trace: [ 421.823013] dump_stack+0x1fc/0x2fe [ 421.826639] should_fail.cold+0xa/0x14 [ 421.830619] ? setup_fault_attr+0x200/0x200 [ 421.834936] ? lock_acquire+0x170/0x3c0 [ 421.838906] __should_failslab+0x115/0x180 [ 421.843224] should_failslab+0x5/0xf [ 421.846929] kmem_cache_alloc_trace+0x284/0x380 [ 421.851600] ? loop_info64_to_compat+0x5e0/0x5e0 [ 421.856443] __kthread_create_on_node+0xd2/0x410 [ 421.861191] ? kthread_parkme+0xa0/0xa0 [ 421.865156] ? lo_ioctl+0x1bb/0x20e0 [ 421.868868] ? __mutex_lock+0x3a8/0x1260 [ 421.872936] ? lock_downgrade+0x720/0x720 [ 421.877089] ? loop_info64_to_compat+0x5e0/0x5e0 [ 421.882094] kthread_create_on_node+0xbb/0xf0 [ 421.886580] ? __kthread_create_on_node+0x410/0x410 [ 421.891592] ? __fget+0x356/0x510 [ 421.895046] ? do_dup2+0x450/0x450 [ 421.898582] ? __lockdep_init_map+0x100/0x5a0 [ 421.903083] ? __lockdep_init_map+0x100/0x5a0 [ 421.907575] lo_ioctl+0xae5/0x20e0 [ 421.911119] ? loop_set_status64+0x110/0x110 [ 421.915529] blkdev_ioctl+0x5cb/0x1a7e [ 421.919416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.924793] ? blkpg_ioctl+0x9d0/0x9d0 [ 421.928678] ? mark_held_locks+0xf0/0xf0 [ 421.932739] ? mark_held_locks+0xf0/0xf0 [ 421.936804] ? debug_check_no_obj_freed+0x201/0x482 [ 421.941902] ? lock_downgrade+0x720/0x720 [ 421.946041] block_ioctl+0xe9/0x130 [ 421.949678] ? blkdev_fallocate+0x3f0/0x3f0 [ 421.954000] do_vfs_ioctl+0xcdb/0x12e0 [ 421.957887] ? lock_downgrade+0x720/0x720 [ 421.962025] ? check_preemption_disabled+0x41/0x280 [ 421.967033] ? ioctl_preallocate+0x200/0x200 [ 421.971441] ? __fget+0x356/0x510 [ 421.974893] ? do_dup2+0x450/0x450 [ 421.978436] ? do_sys_open+0x2bf/0x520 [ 421.982329] ksys_ioctl+0x9b/0xc0 [ 421.985777] __x64_sys_ioctl+0x6f/0xb0 [ 421.989660] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 421.994237] do_syscall_64+0xf9/0x620 [ 421.998047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.003230] RIP: 0033:0x45dd27 [ 422.006413] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.025655] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.033362] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 422.040626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 422.047884] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 422.055151] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 422.062553] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0xfffffffe, 0x0) 14:45:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xe, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) 14:45:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:45 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 424.405259] FAULT_INJECTION: forcing a failure. [ 424.405259] name failslab, interval 1, probability 0, space 0, times 0 [ 424.442047] CPU: 0 PID: 17426 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 14:45:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 424.449963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.459884] Call Trace: [ 424.462489] dump_stack+0x1fc/0x2fe [ 424.466306] should_fail.cold+0xa/0x14 [ 424.470180] ? setup_fault_attr+0x200/0x200 [ 424.474517] ? lock_acquire+0x170/0x3c0 [ 424.478550] __should_failslab+0x115/0x180 [ 424.482771] should_failslab+0x5/0xf [ 424.486469] kmem_cache_alloc_trace+0x284/0x380 [ 424.491562] ? loop_info64_to_compat+0x5e0/0x5e0 [ 424.496320] __kthread_create_on_node+0xd2/0x410 [ 424.501062] ? kthread_parkme+0xa0/0xa0 [ 424.505026] ? lo_ioctl+0x1bb/0x20e0 [ 424.508748] ? __mutex_lock+0x3a8/0x1260 [ 424.512794] ? lock_downgrade+0x720/0x720 [ 424.516930] ? loop_info64_to_compat+0x5e0/0x5e0 [ 424.521688] kthread_create_on_node+0xbb/0xf0 [ 424.526169] ? __kthread_create_on_node+0x410/0x410 [ 424.532043] ? __fget+0x356/0x510 [ 424.535485] ? do_dup2+0x450/0x450 [ 424.539039] ? __lockdep_init_map+0x100/0x5a0 [ 424.543546] ? __lockdep_init_map+0x100/0x5a0 [ 424.548046] lo_ioctl+0xae5/0x20e0 [ 424.551574] ? loop_set_status64+0x110/0x110 [ 424.555976] blkdev_ioctl+0x5cb/0x1a7e [ 424.559851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.565289] ? blkpg_ioctl+0x9d0/0x9d0 [ 424.569181] ? mark_held_locks+0xf0/0xf0 [ 424.573324] ? mark_held_locks+0xf0/0xf0 [ 424.577380] ? debug_check_no_obj_freed+0x201/0x482 [ 424.582383] ? lock_downgrade+0x720/0x720 [ 424.586518] block_ioctl+0xe9/0x130 [ 424.590133] ? blkdev_fallocate+0x3f0/0x3f0 [ 424.594459] do_vfs_ioctl+0xcdb/0x12e0 [ 424.598342] ? lock_downgrade+0x720/0x720 [ 424.602478] ? check_preemption_disabled+0x41/0x280 [ 424.607482] ? ioctl_preallocate+0x200/0x200 [ 424.611877] ? __fget+0x356/0x510 [ 424.615318] ? do_dup2+0x450/0x450 [ 424.618845] ? do_sys_open+0x2bf/0x520 [ 424.622742] ksys_ioctl+0x9b/0xc0 [ 424.626199] __x64_sys_ioctl+0x6f/0xb0 [ 424.630089] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 424.634689] do_syscall_64+0xf9/0x620 [ 424.638486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.643771] RIP: 0033:0x45dd27 [ 424.646950] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.665939] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.673634] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 424.681325] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 424.688599] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 424.695958] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 14:45:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x60, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 424.703220] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:46 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 424.763379] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 424.904699] FAULT_INJECTION: forcing a failure. [ 424.904699] name failslab, interval 1, probability 0, space 0, times 0 [ 424.916524] CPU: 1 PID: 17449 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 424.924418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.933811] Call Trace: [ 424.936416] dump_stack+0x1fc/0x2fe [ 424.940060] should_fail.cold+0xa/0x14 [ 424.943956] ? setup_fault_attr+0x200/0x200 [ 424.948282] ? lock_acquire+0x170/0x3c0 [ 424.952259] __should_failslab+0x115/0x180 [ 424.956487] should_failslab+0x5/0xf [ 424.960197] kmem_cache_alloc+0x277/0x370 [ 424.964370] __kernfs_new_node+0xd2/0x680 [ 424.968516] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 424.973271] ? _raw_spin_unlock_irq+0x5a/0x80 [ 424.977769] ? __cpu_to_node+0x7b/0xa0 [ 424.981657] ? mark_held_locks+0xf0/0xf0 [ 424.985712] ? io_schedule_timeout+0x140/0x140 [ 424.990293] ? enqueue_entity+0xf86/0x3850 [ 424.994517] ? set_user_nice.part.0+0x3b9/0xab0 [ 424.999173] kernfs_create_dir_ns+0x9e/0x230 [ 425.003668] internal_create_group+0x1c1/0xb20 [ 425.008250] ? sysfs_remove_link_from_group+0x70/0x70 [ 425.013426] ? lock_downgrade+0x720/0x720 [ 425.017564] lo_ioctl+0xf7c/0x20e0 [ 425.021107] ? loop_set_status64+0x110/0x110 [ 425.025513] blkdev_ioctl+0x5cb/0x1a7e [ 425.029396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.034758] ? blkpg_ioctl+0x9d0/0x9d0 [ 425.038631] ? mark_held_locks+0xf0/0xf0 [ 425.042686] ? mark_held_locks+0xf0/0xf0 [ 425.046764] ? debug_check_no_obj_freed+0x201/0x482 [ 425.051817] ? lock_downgrade+0x720/0x720 [ 425.055983] block_ioctl+0xe9/0x130 [ 425.059612] ? blkdev_fallocate+0x3f0/0x3f0 [ 425.063940] do_vfs_ioctl+0xcdb/0x12e0 [ 425.067823] ? lock_downgrade+0x720/0x720 [ 425.071971] ? check_preemption_disabled+0x41/0x280 [ 425.076984] ? ioctl_preallocate+0x200/0x200 [ 425.081392] ? __fget+0x356/0x510 [ 425.084856] ? do_dup2+0x450/0x450 [ 425.088514] ? do_sys_open+0x2bf/0x520 [ 425.092389] ksys_ioctl+0x9b/0xc0 [ 425.095834] __x64_sys_ioctl+0x6f/0xb0 [ 425.099716] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 425.104300] do_syscall_64+0xf9/0x620 [ 425.108184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.113356] RIP: 0033:0x45dd27 [ 425.116545] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.135630] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.143518] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 425.150807] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 425.158084] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 425.165341] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 425.172703] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 425.190621] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x1000000000000000, 0x0) 14:45:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {0x0, 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 427.114646] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x300, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 14:45:48 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x353, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 427.507243] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 427.539731] FAULT_INJECTION: forcing a failure. [ 427.539731] name failslab, interval 1, probability 0, space 0, times 0 [ 427.558503] CPU: 1 PID: 17488 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 427.566419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.575797] Call Trace: [ 427.578398] dump_stack+0x1fc/0x2fe [ 427.582044] should_fail.cold+0xa/0x14 [ 427.585947] ? setup_fault_attr+0x200/0x200 [ 427.590290] ? lock_acquire+0x170/0x3c0 [ 427.594286] __should_failslab+0x115/0x180 [ 427.598527] should_failslab+0x5/0xf [ 427.602237] kmem_cache_alloc+0x277/0x370 [ 427.606543] __kernfs_new_node+0xd2/0x680 [ 427.610696] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 427.615450] ? kernfs_activate+0x2c/0x1d0 [ 427.619593] ? lock_downgrade+0x720/0x720 [ 427.623752] ? kernfs_add_one+0x51/0x4c0 [ 427.627815] ? __mutex_add_waiter+0x160/0x160 [ 427.632455] ? __mutex_unlock_slowpath+0xea/0x610 [ 427.637307] kernfs_new_node+0x92/0x120 [ 427.641291] __kernfs_create_file+0x51/0x33f [ 427.645958] sysfs_add_file_mode_ns+0x226/0x540 [ 427.650638] internal_create_group+0x355/0xb20 [ 427.655236] ? sysfs_remove_link_from_group+0x70/0x70 [ 427.660423] ? lock_downgrade+0x720/0x720 [ 427.664580] lo_ioctl+0xf7c/0x20e0 [ 427.668122] ? loop_set_status64+0x110/0x110 [ 427.672528] blkdev_ioctl+0x5cb/0x1a7e [ 427.676523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.681898] ? blkpg_ioctl+0x9d0/0x9d0 [ 427.685891] ? mark_held_locks+0xf0/0xf0 [ 427.689957] ? mark_held_locks+0xf0/0xf0 [ 427.694141] ? debug_check_no_obj_freed+0x201/0x482 [ 427.699252] ? lock_downgrade+0x720/0x720 [ 427.703388] block_ioctl+0xe9/0x130 [ 427.707020] ? blkdev_fallocate+0x3f0/0x3f0 [ 427.711338] do_vfs_ioctl+0xcdb/0x12e0 [ 427.715219] ? lock_downgrade+0x720/0x720 [ 427.719351] ? check_preemption_disabled+0x41/0x280 [ 427.724376] ? ioctl_preallocate+0x200/0x200 [ 427.728777] ? __fget+0x356/0x510 [ 427.732219] ? do_dup2+0x450/0x450 [ 427.735751] ? do_sys_open+0x2bf/0x520 [ 427.739649] ksys_ioctl+0x9b/0xc0 [ 427.743103] __x64_sys_ioctl+0x6f/0xb0 [ 427.747326] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 427.751924] do_syscall_64+0xf9/0x620 [ 427.755747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.760931] RIP: 0033:0x45dd27 [ 427.764118] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.783017] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.790739] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 427.798011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:45:49 executing program 1 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x700, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 427.805408] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 427.813207] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 427.820498] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 427.891482] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:49 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 427.985625] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 428.036706] FAULT_INJECTION: forcing a failure. [ 428.036706] name failslab, interval 1, probability 0, space 0, times 0 [ 428.048531] CPU: 0 PID: 17513 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 428.057149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.066504] Call Trace: [ 428.069119] dump_stack+0x1fc/0x2fe [ 428.072741] should_fail.cold+0xa/0x14 [ 428.076644] ? is_bpf_text_address+0xfc/0x1b0 [ 428.081128] ? setup_fault_attr+0x200/0x200 [ 428.085454] ? kernel_text_address+0xbd/0xf0 [ 428.089936] ? check_preemption_disabled+0x41/0x280 [ 428.094984] __should_failslab+0x115/0x180 [ 428.099210] should_failslab+0x5/0xf [ 428.103006] kmem_cache_alloc+0x3f/0x370 [ 428.107075] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 428.112703] idr_get_free+0x50e/0xa09 [ 428.116513] idr_alloc_u32+0x1a5/0x320 [ 428.120398] ? __fprop_inc_percpu_max+0x210/0x210 [ 428.125238] ? check_preemption_disabled+0x41/0x280 [ 428.130248] ? check_preemption_disabled+0x41/0x280 [ 428.135277] ? should_fail+0x142/0x7b0 [ 428.139183] ? fs_reclaim_release+0xd0/0x110 [ 428.143612] idr_alloc_cyclic+0x102/0x230 [ 428.148033] ? idr_alloc+0x130/0x130 [ 428.151785] ? __kernfs_new_node+0xf9/0x680 [ 428.156104] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 428.161251] __kernfs_new_node+0x11a/0x680 [ 428.165488] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 428.170247] ? _raw_spin_unlock_irq+0x5a/0x80 [ 428.174757] ? __cpu_to_node+0x7b/0xa0 [ 428.178749] ? mark_held_locks+0xf0/0xf0 [ 428.182796] ? io_schedule_timeout+0x140/0x140 [ 428.187364] ? enqueue_entity+0xf86/0x3850 [ 428.191594] ? set_user_nice.part.0+0x3b9/0xab0 [ 428.196255] kernfs_create_dir_ns+0x9e/0x230 [ 428.200661] internal_create_group+0x1c1/0xb20 [ 428.205244] ? sysfs_remove_link_from_group+0x70/0x70 [ 428.210426] ? lock_downgrade+0x720/0x720 [ 428.214569] lo_ioctl+0xf7c/0x20e0 [ 428.218102] ? loop_set_status64+0x110/0x110 [ 428.222501] blkdev_ioctl+0x5cb/0x1a7e [ 428.226374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.231746] ? blkpg_ioctl+0x9d0/0x9d0 [ 428.235648] ? mark_held_locks+0xf0/0xf0 [ 428.239696] ? mark_held_locks+0xf0/0xf0 [ 428.243748] ? debug_check_no_obj_freed+0x201/0x482 [ 428.248799] ? lock_downgrade+0x720/0x720 [ 428.252938] block_ioctl+0xe9/0x130 [ 428.256565] ? blkdev_fallocate+0x3f0/0x3f0 [ 428.260901] do_vfs_ioctl+0xcdb/0x12e0 [ 428.264781] ? lock_downgrade+0x720/0x720 [ 428.268916] ? check_preemption_disabled+0x41/0x280 [ 428.273946] ? ioctl_preallocate+0x200/0x200 [ 428.278353] ? __fget+0x356/0x510 [ 428.281798] ? do_dup2+0x450/0x450 [ 428.285585] ? do_sys_open+0x2bf/0x520 [ 428.289465] ksys_ioctl+0x9b/0xc0 [ 428.292934] __x64_sys_ioctl+0x6f/0xb0 [ 428.296816] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 428.301522] do_syscall_64+0xf9/0x620 [ 428.305488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.310665] RIP: 0033:0x45dd27 [ 428.313860] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.332923] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.340621] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 428.347884] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 428.355172] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 428.362517] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 428.369774] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 428.427977] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x8000000000000000, 0x0) 14:45:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xe00, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:45:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300), 0x0, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:51 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf00, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 430.526797] FAULT_INJECTION: forcing a failure. [ 430.526797] name failslab, interval 1, probability 0, space 0, times 0 [ 430.539962] CPU: 1 PID: 17540 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 430.547871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.557243] Call Trace: [ 430.559846] dump_stack+0x1fc/0x2fe [ 430.563494] should_fail.cold+0xa/0x14 [ 430.567403] ? setup_fault_attr+0x200/0x200 [ 430.571734] ? lock_acquire+0x170/0x3c0 14:45:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) [ 430.575731] __should_failslab+0x115/0x180 [ 430.580009] should_failslab+0x5/0xf [ 430.583731] kmem_cache_alloc+0x277/0x370 [ 430.588038] __kernfs_new_node+0xd2/0x680 [ 430.592203] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 430.597112] ? kernfs_activate+0x2c/0x1d0 [ 430.601254] ? lock_downgrade+0x720/0x720 [ 430.605397] ? kernfs_add_one+0x51/0x4c0 [ 430.609469] ? __mutex_add_waiter+0x160/0x160 [ 430.613966] ? __mutex_unlock_slowpath+0xea/0x610 [ 430.618797] kernfs_new_node+0x92/0x120 [ 430.622868] __kernfs_create_file+0x51/0x33f [ 430.627268] sysfs_add_file_mode_ns+0x226/0x540 [ 430.631957] internal_create_group+0x355/0xb20 [ 430.636543] ? sysfs_remove_link_from_group+0x70/0x70 [ 430.641729] ? lock_downgrade+0x720/0x720 [ 430.645892] lo_ioctl+0xf7c/0x20e0 [ 430.649445] ? loop_set_status64+0x110/0x110 [ 430.653853] blkdev_ioctl+0x5cb/0x1a7e [ 430.657731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.663252] ? blkpg_ioctl+0x9d0/0x9d0 [ 430.667130] ? mark_held_locks+0xf0/0xf0 [ 430.671288] ? mark_held_locks+0xf0/0xf0 [ 430.675345] ? debug_check_no_obj_freed+0x201/0x482 [ 430.680351] ? lock_downgrade+0x720/0x720 [ 430.684498] block_ioctl+0xe9/0x130 [ 430.688137] ? blkdev_fallocate+0x3f0/0x3f0 [ 430.692467] do_vfs_ioctl+0xcdb/0x12e0 [ 430.696351] ? lock_downgrade+0x720/0x720 [ 430.700501] ? check_preemption_disabled+0x41/0x280 [ 430.705940] ? ioctl_preallocate+0x200/0x200 [ 430.710347] ? __fget+0x356/0x510 [ 430.713836] ? do_dup2+0x450/0x450 [ 430.717397] ? do_sys_open+0x2bf/0x520 [ 430.721279] ksys_ioctl+0x9b/0xc0 [ 430.724742] __x64_sys_ioctl+0x6f/0xb0 [ 430.728613] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 430.733184] do_syscall_64+0xf9/0x620 [ 430.736970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.742144] RIP: 0033:0x45dd27 [ 430.746191] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.765255] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:45:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x5303, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 430.772963] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 430.780240] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 430.787510] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 430.794777] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 430.802044] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 430.846004] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 430.870052] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x6000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x300) 14:45:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 431.037328] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 431.046129] EXT4-fs (loop2): group descriptors corrupted! 14:45:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0xfeffffff00000000, 0x0) 14:45:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:54 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x34000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00', 0x1, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0xffffffff00000000, 0x0) 14:45:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x5, &(0x7f0000001380)=[{&(0x7f00000001c0)="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", 0x1000, 0x6}, {&(0x7f00000011c0)="6d9c00726338b1ff72dc1e1ae0c4a7c0655f051a391b21c4884a25761ca77e07eb44231ce0d592e6e345218624cb6aee8d3730972a92277d5c16872804afaad2cc4b313bb63c96afe973ea2f7c5aa7eff62d7fc7d9fb844f6ced582119bd07c123a413599ebc2b907261fdcb0c499ccc72821a9fd1ed1194b01372d2f041535c3c745a1b49c616f2d74548760a43ad580a4112d7621f9ff8c857d4104c14b185b07e331f1504407002e80e7e1f679969ee46b5552274a07fffb0ca0a15a2565ef93b8fce27e540fced9b9267d2b0", 0xce, 0xf01b}, {&(0x7f0000000080)="a39ded84175f3641e7f2fe0d49f86af0d77e4095e7b4058fbc37114eb3d196746f8cd5b4d6e66e1b6186417d3bb6", 0x2e, 0xf1}, {&(0x7f00000012c0)="f8e36b8f176f4dc3bbb2a2465911cb09626b54b14cccbe4590131e6c99bea4997ac059b17fc05dc96a1a1c5f6f841443ac4fb34fb901fef89d0a5f5aac7a63227214acbafa366cf210deb67105250e72b8c3b8d22e530f08462c829c9c2da71ea5cd89c337f84f18065f971d5ff5d4dce0cc78f4401c578ff4dda56ed0cf49c258bc1242a6303e52bfb12d51710909d9986008372933d24a3f9af84cfdad89edb2926c53eb26bfe4", 0xa8, 0x51}, {&(0x7f00000000c0)="29ee6129e5dea91b47b20de85da759837807d02379b8c023f84683fcee3f681f21674393d376863972ec7776710de019ef5b038793d7c4e1dfc400cf", 0x3c}], 0x2004404, &(0x7f0000001400)={[{'*'}, {}, {'@*.$+'}, {']'}, {'configfs\x00'}, {'configfs\x00'}, {'configfs\x00'}], [{@appraise='appraise'}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '.&\x99:/%)'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x1}}]}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 433.571009] FAULT_INJECTION: forcing a failure. [ 433.571009] name failslab, interval 1, probability 0, space 0, times 0 [ 433.588034] CPU: 1 PID: 17595 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 433.595947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.605314] Call Trace: [ 433.607925] dump_stack+0x1fc/0x2fe [ 433.611570] should_fail.cold+0xa/0x14 [ 433.615469] ? setup_fault_attr+0x200/0x200 14:45:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x400300, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 433.619889] ? lock_acquire+0x170/0x3c0 [ 433.623882] __should_failslab+0x115/0x180 [ 433.628123] should_failslab+0x5/0xf [ 433.631837] kmem_cache_alloc+0x277/0x370 [ 433.636002] __kernfs_new_node+0xd2/0x680 [ 433.640300] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 433.645198] ? __mutex_unlock_slowpath+0xea/0x610 [ 433.650229] ? wait_for_completion_io+0x10/0x10 [ 433.654913] ? kernfs_next_descendant_post+0x19c/0x290 [ 433.660190] kernfs_new_node+0x92/0x120 [ 433.664178] __kernfs_create_file+0x51/0x33f [ 433.668581] sysfs_add_file_mode_ns+0x226/0x540 [ 433.673240] internal_create_group+0x355/0xb20 [ 433.677808] ? sysfs_remove_link_from_group+0x70/0x70 [ 433.682989] ? lock_downgrade+0x720/0x720 [ 433.687135] lo_ioctl+0xf7c/0x20e0 [ 433.690668] ? loop_set_status64+0x110/0x110 [ 433.695065] blkdev_ioctl+0x5cb/0x1a7e [ 433.698963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.704832] ? blkpg_ioctl+0x9d0/0x9d0 [ 433.708876] ? mark_held_locks+0xf0/0xf0 [ 433.713094] ? mark_held_locks+0xf0/0xf0 [ 433.717160] ? debug_check_no_obj_freed+0x201/0x482 [ 433.722168] ? lock_downgrade+0x720/0x720 [ 433.726412] block_ioctl+0xe9/0x130 [ 433.730046] ? blkdev_fallocate+0x3f0/0x3f0 [ 433.734354] do_vfs_ioctl+0xcdb/0x12e0 [ 433.738442] ? lock_downgrade+0x720/0x720 [ 433.742605] ? check_preemption_disabled+0x41/0x280 [ 433.747612] ? ioctl_preallocate+0x200/0x200 [ 433.752023] ? __fget+0x356/0x510 [ 433.755466] ? do_dup2+0x450/0x450 [ 433.758990] ? do_sys_open+0x2bf/0x520 [ 433.762989] ksys_ioctl+0x9b/0xc0 [ 433.769314] __x64_sys_ioctl+0x6f/0xb0 [ 433.773194] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 433.777772] do_syscall_64+0xf9/0x620 [ 433.781572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.786943] RIP: 0033:0x45dd27 [ 433.790142] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.809035] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 433.816732] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 433.824167] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 433.831446] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 433.838699] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 433.845953] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 433.863445] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:55 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 433.897964] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop1 [ 433.900767] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:45:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf0ffff, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0xc4) lseek(r0, 0x0, 0x1) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 14:45:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00', 0x1, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 434.081842] FAULT_INJECTION: forcing a failure. [ 434.081842] name failslab, interval 1, probability 0, space 0, times 0 [ 434.103763] CPU: 0 PID: 17635 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 434.111689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.121052] Call Trace: [ 434.123657] dump_stack+0x1fc/0x2fe [ 434.127307] should_fail.cold+0xa/0x14 [ 434.131297] ? setup_fault_attr+0x200/0x200 [ 434.135632] ? lock_acquire+0x170/0x3c0 [ 434.139623] __should_failslab+0x115/0x180 [ 434.143863] should_failslab+0x5/0xf [ 434.147571] kmem_cache_alloc+0x277/0x370 [ 434.151721] __kernfs_new_node+0xd2/0x680 [ 434.155969] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 434.160737] ? __mutex_unlock_slowpath+0xea/0x610 [ 434.165592] ? wait_for_completion_io+0x10/0x10 [ 434.170992] ? kernfs_next_descendant_post+0x19c/0x290 [ 434.176269] kernfs_new_node+0x92/0x120 [ 434.180244] __kernfs_create_file+0x51/0x33f [ 434.185035] sysfs_add_file_mode_ns+0x226/0x540 [ 434.189810] internal_create_group+0x355/0xb20 [ 434.194398] ? sysfs_remove_link_from_group+0x70/0x70 [ 434.199582] ? lock_downgrade+0x720/0x720 [ 434.203742] lo_ioctl+0xf7c/0x20e0 [ 434.207354] ? loop_set_status64+0x110/0x110 [ 434.211763] blkdev_ioctl+0x5cb/0x1a7e [ 434.215647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.221607] ? blkpg_ioctl+0x9d0/0x9d0 [ 434.225480] ? mark_held_locks+0xf0/0xf0 [ 434.229536] ? mark_held_locks+0xf0/0xf0 [ 434.233616] ? debug_check_no_obj_freed+0x201/0x482 [ 434.238618] ? lock_downgrade+0x720/0x720 [ 434.242753] block_ioctl+0xe9/0x130 [ 434.246365] ? blkdev_fallocate+0x3f0/0x3f0 [ 434.251179] do_vfs_ioctl+0xcdb/0x12e0 [ 434.255067] ? lock_downgrade+0x720/0x720 [ 434.259209] ? check_preemption_disabled+0x41/0x280 [ 434.264247] ? ioctl_preallocate+0x200/0x200 [ 434.268656] ? __fget+0x356/0x510 [ 434.272114] ? do_dup2+0x450/0x450 [ 434.275719] ? do_sys_open+0x2bf/0x520 [ 434.279613] ksys_ioctl+0x9b/0xc0 [ 434.283098] __x64_sys_ioctl+0x6f/0xb0 [ 434.286981] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 434.291573] do_syscall_64+0xf9/0x620 [ 434.295417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.300738] RIP: 0033:0x45dd27 [ 434.303977] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.323418] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:45:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0/file0\x00', 0x101500, 0x88) lseek(r0, 0x0, 0x1) 14:45:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x1000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 434.331125] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 434.338414] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 434.345694] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 434.352951] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 434.360221] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:55 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 434.407281] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 434.427496] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x2000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 434.574712] FAULT_INJECTION: forcing a failure. [ 434.574712] name failslab, interval 1, probability 0, space 0, times 0 [ 434.590850] CPU: 1 PID: 17665 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 434.598753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.609174] Call Trace: [ 434.611768] dump_stack+0x1fc/0x2fe [ 434.615465] should_fail.cold+0xa/0x14 [ 434.619417] ? setup_fault_attr+0x200/0x200 [ 434.623735] ? lock_acquire+0x170/0x3c0 [ 434.627711] __should_failslab+0x115/0x180 [ 434.631945] should_failslab+0x5/0xf [ 434.635650] kmem_cache_alloc+0x277/0x370 [ 434.639786] __kernfs_new_node+0xd2/0x680 [ 434.644034] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 434.648828] ? __mutex_unlock_slowpath+0xea/0x610 [ 434.653665] ? wait_for_completion_io+0x10/0x10 [ 434.658461] ? kernfs_next_descendant_post+0x19c/0x290 [ 434.663742] kernfs_new_node+0x92/0x120 [ 434.667724] __kernfs_create_file+0x51/0x33f [ 434.672145] sysfs_add_file_mode_ns+0x226/0x540 [ 434.676824] internal_create_group+0x355/0xb20 [ 434.681500] ? sysfs_remove_link_from_group+0x70/0x70 [ 434.686678] ? lock_downgrade+0x720/0x720 [ 434.691374] lo_ioctl+0xf7c/0x20e0 [ 434.694919] ? loop_set_status64+0x110/0x110 [ 434.699539] blkdev_ioctl+0x5cb/0x1a7e [ 434.703413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.709037] ? blkpg_ioctl+0x9d0/0x9d0 [ 434.712933] ? mark_held_locks+0xf0/0xf0 [ 434.716977] ? mark_held_locks+0xf0/0xf0 [ 434.721057] ? debug_check_no_obj_freed+0x201/0x482 [ 434.726060] ? lock_downgrade+0x720/0x720 [ 434.730213] block_ioctl+0xe9/0x130 [ 434.733845] ? blkdev_fallocate+0x3f0/0x3f0 [ 434.738155] do_vfs_ioctl+0xcdb/0x12e0 [ 434.742029] ? lock_downgrade+0x720/0x720 [ 434.746172] ? check_preemption_disabled+0x41/0x280 [ 434.751171] ? ioctl_preallocate+0x200/0x200 [ 434.755567] ? __fget+0x356/0x510 [ 434.759009] ? do_dup2+0x450/0x450 [ 434.762532] ? do_sys_open+0x2bf/0x520 [ 434.766412] ksys_ioctl+0x9b/0xc0 [ 434.769860] __x64_sys_ioctl+0x6f/0xb0 [ 434.773749] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 434.778417] do_syscall_64+0xf9/0x620 [ 434.782222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.787403] RIP: 0033:0x45dd27 [ 434.790602] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.809591] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.817391] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 434.824652] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 434.831992] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 434.839262] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 434.846516] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 434.886843] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:45:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x10) 14:45:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:45:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00', 0x1, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0xd) lseek(r0, 0x0, 0x1) 14:45:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x3000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:57 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x4000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 436.628606] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 436.636666] FAULT_INJECTION: forcing a failure. [ 436.636666] name failslab, interval 1, probability 0, space 0, times 0 [ 436.657391] CPU: 1 PID: 17688 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 436.665309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.674666] Call Trace: [ 436.677273] dump_stack+0x1fc/0x2fe [ 436.680957] should_fail.cold+0xa/0x14 [ 436.684859] ? setup_fault_attr+0x200/0x200 [ 436.689186] ? lock_acquire+0x170/0x3c0 [ 436.693156] ? dev_uevent_filter+0xd0/0xd0 [ 436.697508] __should_failslab+0x115/0x180 [ 436.701737] should_failslab+0x5/0xf [ 436.705439] kmem_cache_alloc_trace+0x284/0x380 [ 436.710105] ? dev_uevent_filter+0xd0/0xd0 [ 436.714330] kobject_uevent_env+0x236/0x14a0 [ 436.718727] lo_ioctl+0xff9/0x20e0 [ 436.722265] ? loop_set_status64+0x110/0x110 [ 436.726681] blkdev_ioctl+0x5cb/0x1a7e [ 436.730645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.736044] ? blkpg_ioctl+0x9d0/0x9d0 [ 436.739931] ? mark_held_locks+0xf0/0xf0 [ 436.743982] ? mark_held_locks+0xf0/0xf0 [ 436.748039] ? debug_check_no_obj_freed+0x201/0x482 [ 436.753041] ? lock_downgrade+0x720/0x720 [ 436.757176] block_ioctl+0xe9/0x130 [ 436.761229] ? blkdev_fallocate+0x3f0/0x3f0 [ 436.765554] do_vfs_ioctl+0xcdb/0x12e0 [ 436.769440] ? lock_downgrade+0x720/0x720 [ 436.773580] ? check_preemption_disabled+0x41/0x280 [ 436.778579] ? ioctl_preallocate+0x200/0x200 [ 436.782981] ? __fget+0x356/0x510 [ 436.786418] ? do_dup2+0x450/0x450 [ 436.789956] ? do_sys_open+0x2bf/0x520 [ 436.793873] ksys_ioctl+0x9b/0xc0 [ 436.797322] __x64_sys_ioctl+0x6f/0xb0 [ 436.801210] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 436.805927] do_syscall_64+0xf9/0x620 [ 436.809885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.815225] RIP: 0033:0x45dd27 [ 436.818406] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.837434] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 436.845147] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 436.852408] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 436.859677] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 436.866949] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 14:45:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs4\x00', 0x200000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 436.874231] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:45:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x7000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:45:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00'/21, 0x15, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:45:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x8000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 436.964850] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue [ 437.104710] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x10000000) 14:46:00 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x608080, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x134, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35b}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1b}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffa}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x134}, 0x1, 0x0, 0x0, 0x8000}, 0x8045) 14:46:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xe000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00'/21, 0x15, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 439.667588] FAULT_INJECTION: forcing a failure. [ 439.667588] name failslab, interval 1, probability 0, space 0, times 0 [ 439.693683] CPU: 1 PID: 17731 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 439.701605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.710961] Call Trace: [ 439.713567] dump_stack+0x1fc/0x2fe [ 439.717200] should_fail.cold+0xa/0x14 [ 439.721190] ? setup_fault_attr+0x200/0x200 [ 439.725504] ? lock_acquire+0x170/0x3c0 [ 439.729469] __should_failslab+0x115/0x180 [ 439.733687] should_failslab+0x5/0xf [ 439.737393] kmem_cache_alloc+0x277/0x370 [ 439.741550] __kernfs_new_node+0xd2/0x680 [ 439.745686] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 439.750428] ? __mutex_unlock_slowpath+0xea/0x610 [ 439.755267] ? wait_for_completion_io+0x10/0x10 [ 439.759928] ? kernfs_next_descendant_post+0x19c/0x290 [ 439.765198] kernfs_new_node+0x92/0x120 [ 439.769318] __kernfs_create_file+0x51/0x33f [ 439.773937] sysfs_add_file_mode_ns+0x226/0x540 [ 439.778645] internal_create_group+0x355/0xb20 [ 439.783228] ? sysfs_remove_link_from_group+0x70/0x70 [ 439.788404] ? lock_downgrade+0x720/0x720 [ 439.792573] lo_ioctl+0xf7c/0x20e0 [ 439.796107] ? loop_set_status64+0x110/0x110 [ 439.800520] blkdev_ioctl+0x5cb/0x1a7e [ 439.804398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.809761] ? blkpg_ioctl+0x9d0/0x9d0 [ 439.813748] ? mark_held_locks+0xf0/0xf0 [ 439.817826] ? mark_held_locks+0xf0/0xf0 [ 439.822148] ? debug_check_no_obj_freed+0x201/0x482 [ 439.827149] ? lock_downgrade+0x720/0x720 [ 439.831282] block_ioctl+0xe9/0x130 [ 439.834891] ? blkdev_fallocate+0x3f0/0x3f0 [ 439.839198] do_vfs_ioctl+0xcdb/0x12e0 [ 439.843068] ? lock_downgrade+0x720/0x720 [ 439.847212] ? check_preemption_disabled+0x41/0x280 [ 439.852212] ? ioctl_preallocate+0x200/0x200 [ 439.856603] ? __fget+0x356/0x510 [ 439.860053] ? do_dup2+0x450/0x450 [ 439.863585] ? do_sys_open+0x2bf/0x520 [ 439.867730] ksys_ioctl+0x9b/0xc0 [ 439.871176] __x64_sys_ioctl+0x6f/0xb0 [ 439.875057] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 439.879622] do_syscall_64+0xf9/0x620 [ 439.883407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.889272] RIP: 0033:0x45dd27 [ 439.892446] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xe1b5a976ba2e41b6, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x2}}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40005) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:46:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 439.911332] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.919025] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 439.926303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 439.933658] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 439.940916] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 439.948178] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 440.003856] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 440.015436] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x53030000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:01 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)='\x00'/21, 0x15, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x60000000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 440.159802] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 440.177997] FAULT_INJECTION: forcing a failure. [ 440.177997] name failslab, interval 1, probability 0, space 0, times 0 [ 440.189511] CPU: 1 PID: 17769 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 440.197395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.206825] Call Trace: [ 440.209417] dump_stack+0x1fc/0x2fe [ 440.213057] should_fail.cold+0xa/0x14 [ 440.216960] ? setup_fault_attr+0x200/0x200 [ 440.221291] ? lock_acquire+0x170/0x3c0 [ 440.225277] __should_failslab+0x115/0x180 [ 440.229515] should_failslab+0x5/0xf [ 440.233571] __kmalloc+0x2ab/0x3c0 [ 440.237095] ? kobject_get_path+0xbf/0x240 [ 440.241313] kobject_get_path+0xbf/0x240 [ 440.245379] kobject_uevent_env+0x25c/0x14a0 [ 440.249782] lo_ioctl+0xff9/0x20e0 [ 440.253486] ? loop_set_status64+0x110/0x110 [ 440.257881] blkdev_ioctl+0x5cb/0x1a7e [ 440.261761] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.267119] ? blkpg_ioctl+0x9d0/0x9d0 [ 440.270989] ? mark_held_locks+0xf0/0xf0 [ 440.275038] ? mark_held_locks+0xf0/0xf0 [ 440.279093] ? debug_check_no_obj_freed+0x201/0x482 [ 440.284097] ? lock_downgrade+0x720/0x720 [ 440.288231] block_ioctl+0xe9/0x130 [ 440.291855] ? blkdev_fallocate+0x3f0/0x3f0 [ 440.296158] do_vfs_ioctl+0xcdb/0x12e0 [ 440.300029] ? lock_downgrade+0x720/0x720 [ 440.304158] ? check_preemption_disabled+0x41/0x280 [ 440.309158] ? ioctl_preallocate+0x200/0x200 [ 440.313551] ? __fget+0x356/0x510 [ 440.317000] ? do_dup2+0x450/0x450 [ 440.320521] ? do_sys_open+0x2bf/0x520 [ 440.324395] ksys_ioctl+0x9b/0xc0 [ 440.327842] __x64_sys_ioctl+0x6f/0xb0 [ 440.331731] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 440.336305] do_syscall_64+0xf9/0x620 [ 440.340090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.345372] RIP: 0033:0x45dd27 [ 440.348545] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.367862] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.375554] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 440.382808] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 440.390060] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 440.397313] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 440.404578] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 440.450941] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0xfeffffff) 14:46:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x8, 0x1990, {r1, r2/1000+10000}, {0x77359400}, {0x2, 0x0, 0x1}, 0x1, @can={{0x0, 0x0, 0x1, 0x1}, 0x8, 0x2, 0x0, 0x0, "8a389702ee7bb419"}}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000010) 14:46:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x80ffffff, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="00000000000000000000000000000000000000000000000000000000148191", 0x1f, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:04 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x9effffff, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 442.708771] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 442.727148] FAULT_INJECTION: forcing a failure. [ 442.727148] name failslab, interval 1, probability 0, space 0, times 0 [ 442.742603] CPU: 1 PID: 17795 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 442.750507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.759870] Call Trace: [ 442.762472] dump_stack+0x1fc/0x2fe [ 442.766103] should_fail.cold+0xa/0x14 [ 442.769983] ? setup_fault_attr+0x200/0x200 [ 442.774301] ? lock_acquire+0x170/0x3c0 [ 442.778361] __should_failslab+0x115/0x180 [ 442.783809] should_failslab+0x5/0xf [ 442.787523] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 442.792622] __kmalloc_node_track_caller+0x38/0x70 [ 442.797634] __alloc_skb+0xae/0x560 [ 442.801264] alloc_uevent_skb+0x7b/0x210 [ 442.805348] kobject_uevent_env+0xa83/0x14a0 [ 442.809887] lo_ioctl+0xff9/0x20e0 [ 442.813417] ? loop_set_status64+0x110/0x110 [ 442.817813] blkdev_ioctl+0x5cb/0x1a7e [ 442.821698] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.827193] ? blkpg_ioctl+0x9d0/0x9d0 [ 442.831072] ? mark_held_locks+0xf0/0xf0 [ 442.835176] ? mark_held_locks+0xf0/0xf0 [ 442.839234] ? debug_check_no_obj_freed+0x201/0x482 [ 442.844246] ? lock_downgrade+0x720/0x720 [ 442.848586] block_ioctl+0xe9/0x130 [ 442.852201] ? blkdev_fallocate+0x3f0/0x3f0 [ 442.856510] do_vfs_ioctl+0xcdb/0x12e0 [ 442.860420] ? lock_downgrade+0x720/0x720 [ 442.864563] ? check_preemption_disabled+0x41/0x280 [ 442.869564] ? ioctl_preallocate+0x200/0x200 [ 442.873961] ? __fget+0x356/0x510 [ 442.877399] ? do_dup2+0x450/0x450 [ 442.880955] ? do_sys_open+0x2bf/0x520 [ 442.884842] ksys_ioctl+0x9b/0xc0 [ 442.888283] __x64_sys_ioctl+0x6f/0xb0 [ 442.892155] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 442.896721] do_syscall_64+0xf9/0x620 [ 442.900526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.905715] RIP: 0033:0x45dd27 [ 442.909042] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.927955] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.935693] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 442.942970] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 442.950494] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 14:46:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40280, 0x10) lseek(r0, 0x0, 0x2) [ 442.957757] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 442.965095] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 14:46:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="00000000000000000000000000000000000000000000000000000000148191", 0x1f, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xf0ffffff, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 443.069198] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:04 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) syz_mount_image$qnx6(&(0x7f0000000000)='qnx6\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="863bf6867a0d4bb8602725984358cbb219802ade076cced8e2026f69d5ab9ff955d1ab1776c025309d032ad7c7e28aaa8ba74f03d0f009ad238505944be428c8de8448e06fd7ef2816aa6a3cc6f95fd910410a8ccfc3d4a503f90ab70797952b17bdecba99116d96d7c1bb178a96bc7b0d", 0x71, 0xffff}], 0x2008000, &(0x7f00000001c0)={[{'[^.]'}, {'configfs\x00'}, {}, {'configfs\x00'}, {'configfs\x00'}], [{@permit_directio='permit_directio'}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, 'configfs\x00'}}, {@fsmagic={'fsmagic'}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, ',*-\xa9\x0f]%!))%&&&\x9f'}}, {@smackfsroot={'smackfsroot', 0x3d, 'configfs\x00'}}]}) lseek(r0, 0x0, 0x1) [ 443.115876] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 443.228679] qnx6: invalid mount options. [ 443.261697] FAULT_INJECTION: forcing a failure. [ 443.261697] name failslab, interval 1, probability 0, space 0, times 0 [ 443.274892] CPU: 0 PID: 17837 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 443.283082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.292553] Call Trace: [ 443.295134] dump_stack+0x1fc/0x2fe [ 443.298956] should_fail.cold+0xa/0x14 [ 443.302852] ? setup_fault_attr+0x200/0x200 [ 443.307246] ? lock_acquire+0x170/0x3c0 [ 443.311210] __should_failslab+0x115/0x180 [ 443.315429] should_failslab+0x5/0xf [ 443.319128] __kmalloc+0x2ab/0x3c0 [ 443.322666] ? kobject_get_path+0xbf/0x240 [ 443.326883] kobject_get_path+0xbf/0x240 [ 443.330930] kobject_uevent_env+0x25c/0x14a0 [ 443.335328] lo_ioctl+0xff9/0x20e0 [ 443.338873] ? loop_set_status64+0x110/0x110 [ 443.343269] blkdev_ioctl+0x5cb/0x1a7e [ 443.347149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.352519] ? blkpg_ioctl+0x9d0/0x9d0 [ 443.356407] ? mark_held_locks+0xf0/0xf0 [ 443.360451] ? mark_held_locks+0xf0/0xf0 [ 443.364508] ? debug_check_no_obj_freed+0x201/0x482 [ 443.369509] ? lock_downgrade+0x720/0x720 [ 443.373655] block_ioctl+0xe9/0x130 [ 443.377265] ? blkdev_fallocate+0x3f0/0x3f0 [ 443.381568] do_vfs_ioctl+0xcdb/0x12e0 [ 443.385458] ? lock_downgrade+0x720/0x720 [ 443.389596] ? check_preemption_disabled+0x41/0x280 [ 443.394595] ? ioctl_preallocate+0x200/0x200 [ 443.399016] ? __fget+0x356/0x510 [ 443.402470] ? do_dup2+0x450/0x450 [ 443.406006] ? do_sys_open+0x2bf/0x520 [ 443.409880] ksys_ioctl+0x9b/0xc0 [ 443.413473] __x64_sys_ioctl+0x6f/0xb0 [ 443.417363] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 443.421939] do_syscall_64+0xf9/0x620 [ 443.425738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.430963] RIP: 0033:0x45dd27 [ 443.434227] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.453118] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.460857] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 443.468109] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 443.475364] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 443.485035] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 443.492290] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 443.522248] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="00000000000000000000000000000000000000000000000000000000148191", 0x1f, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xfffff000, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0xfffffffe) 14:46:07 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x12) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs4\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = syz_open_dev$char_raw(&(0x7f00000011c0)='/dev/raw/raw#\x00', 0x1, 0x1e5081) ioctl$CHAR_RAW_RAGET(r1, 0x1263, &(0x7f0000001200)) r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000001100)=0x1) ioctl$PIO_FONTRESET(r3, 0x8925, 0x20000000) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f00000012c0)={0x100, 0xfb, 0xd48}) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02cc52b5754400e90d006b4c01d10000"], 0x10}}, 0x0) connect$rose(r0, &(0x7f0000001240)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @default}, 0x1c) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000001280)={0xce62, 0x17, [{}, {0x7, 0x1}, {0x2}, {0xf}, {0x7}, {0xc}, {0x6, 0x1}, {0x4}, {0x5}, {0xa, 0x1}, {0x8}, {0x7, 0x1}, {0xc}, {0xf}, {0x9, 0x1}, {0xa, 0x1}, {0x7}, {0x4}, {0xa, 0x1}, {0x3}, {0x8}, {0xb, 0x1}, {0x2}]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000000)={{0x0, 0x2, 0x7fffffff, 0xd5, 0x1, 0x1, 0x0, 0x400, 0xc9, 0x20, 0x5, 0x5, 0x7ff, 0x6f087480, 0x532b}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000100)) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f00000001c0)={r4, 0x3f}) [ 445.744952] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 445.757814] FAULT_INJECTION: forcing a failure. [ 445.757814] name failslab, interval 1, probability 0, space 0, times 0 [ 445.780905] CPU: 1 PID: 17850 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 445.788848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.798210] Call Trace: [ 445.800813] dump_stack+0x1fc/0x2fe [ 445.804583] should_fail.cold+0xa/0x14 [ 445.808494] ? setup_fault_attr+0x200/0x200 [ 445.812825] ? lock_acquire+0x170/0x3c0 [ 445.816818] __should_failslab+0x115/0x180 [ 445.821067] should_failslab+0x5/0xf [ 445.824790] kmem_cache_alloc_trace+0x284/0x380 [ 445.829466] ? wait_for_completion_io+0x10/0x10 [ 445.834148] ? kobject_init_and_add.cold+0x16/0x16 [ 445.839095] call_usermodehelper_setup+0x84/0x300 [ 445.843949] kobject_uevent_env+0xe87/0x14a0 [ 445.848377] lo_ioctl+0xff9/0x20e0 [ 445.851931] ? loop_set_status64+0x110/0x110 [ 445.856350] blkdev_ioctl+0x5cb/0x1a7e [ 445.860241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.865618] ? blkpg_ioctl+0x9d0/0x9d0 [ 445.869512] ? mark_held_locks+0xf0/0xf0 [ 445.873578] ? mark_held_locks+0xf0/0xf0 [ 445.877648] ? debug_check_no_obj_freed+0x201/0x482 [ 445.882675] ? lock_downgrade+0x720/0x720 [ 445.887008] block_ioctl+0xe9/0x130 [ 445.890642] ? blkdev_fallocate+0x3f0/0x3f0 [ 445.894960] do_vfs_ioctl+0xcdb/0x12e0 [ 445.898831] ? lock_downgrade+0x720/0x720 [ 445.903085] ? check_preemption_disabled+0x41/0x280 [ 445.908093] ? ioctl_preallocate+0x200/0x200 [ 445.912489] ? __fget+0x356/0x510 [ 445.915985] ? do_dup2+0x450/0x450 [ 445.919545] ? do_sys_open+0x2bf/0x520 [ 445.923433] ksys_ioctl+0x9b/0xc0 [ 445.927546] __x64_sys_ioctl+0x6f/0xb0 [ 445.931421] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 445.935988] do_syscall_64+0xf9/0x620 [ 445.939775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.944961] RIP: 0033:0x45dd27 [ 445.948137] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.967109] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.975027] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 445.982303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:46:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xffffff7f, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000", 0x24, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 445.989556] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 445.996808] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 446.004158] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 446.045209] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xffffff80, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:07 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xffffff9e, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x2) lseek(r0, 0x0, 0x1) [ 446.194676] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 446.223792] EXT4-fs (loop2): group descriptors corrupted! 14:46:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 446.254265] FAULT_INJECTION: forcing a failure. [ 446.254265] name failslab, interval 1, probability 0, space 0, times 0 [ 446.284578] CPU: 1 PID: 17908 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 446.292492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.301851] Call Trace: [ 446.304452] dump_stack+0x1fc/0x2fe [ 446.308108] should_fail.cold+0xa/0x14 [ 446.312020] ? setup_fault_attr+0x200/0x200 [ 446.316437] ? lock_acquire+0x170/0x3c0 [ 446.320442] __should_failslab+0x115/0x180 [ 446.324691] should_failslab+0x5/0xf [ 446.328415] kmem_cache_alloc_trace+0x284/0x380 [ 446.333108] ? wait_for_completion_io+0x10/0x10 [ 446.337798] ? kobject_init_and_add.cold+0x16/0x16 [ 446.343266] call_usermodehelper_setup+0x84/0x300 [ 446.348221] kobject_uevent_env+0xe87/0x14a0 [ 446.352661] lo_ioctl+0xff9/0x20e0 [ 446.356228] ? loop_set_status64+0x110/0x110 [ 446.360655] blkdev_ioctl+0x5cb/0x1a7e [ 446.364562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.369937] ? blkpg_ioctl+0x9d0/0x9d0 [ 446.373835] ? mark_held_locks+0xf0/0xf0 [ 446.377907] ? mark_held_locks+0xf0/0xf0 [ 446.381984] ? debug_check_no_obj_freed+0x201/0x482 [ 446.387278] ? lock_downgrade+0x720/0x720 [ 446.391438] block_ioctl+0xe9/0x130 [ 446.395076] ? blkdev_fallocate+0x3f0/0x3f0 [ 446.399398] do_vfs_ioctl+0xcdb/0x12e0 [ 446.403299] ? lock_downgrade+0x720/0x720 [ 446.407605] ? check_preemption_disabled+0x41/0x280 [ 446.412619] ? ioctl_preallocate+0x200/0x200 [ 446.417038] ? __fget+0x356/0x510 [ 446.420487] ? do_dup2+0x450/0x450 [ 446.424039] ? do_sys_open+0x2bf/0x520 [ 446.427919] ksys_ioctl+0x9b/0xc0 [ 446.431377] __x64_sys_ioctl+0x6f/0xb0 [ 446.435249] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 446.439814] do_syscall_64+0xf9/0x620 [ 446.443599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.448773] RIP: 0033:0x45dd27 [ 446.451949] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.470850] RSP: 002b:00007fa358562a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.478541] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 446.485794] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 446.493065] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 446.500339] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 446.507594] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 446.565201] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'memory'}, {0x2b, 'memory'}, {0x2b, 'cpu'}]}, 0x15) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:46:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xfffffff0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:10 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x1000000000000000) 14:46:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 14:46:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000", 0x24, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 14:46:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0xffffffff, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000000)={0x5, "64a73a1fd52a8eb966e734e9dac07852da2b92474e21ace2c7909e51e29fed1e", 0x4, 0x1, 0x6, 0x0, 0x4, 0x2, 0x3, 0x57}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000080)=0xfffff001) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r2, 0x400, 0x3) [ 448.835439] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 448.852939] FAULT_INJECTION: forcing a failure. [ 448.852939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 448.864787] CPU: 1 PID: 17948 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 448.867874] EXT4-fs (loop2): group descriptors corrupted! 14:46:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 14:46:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 448.872671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.872678] Call Trace: [ 448.872700] dump_stack+0x1fc/0x2fe [ 448.872719] should_fail.cold+0xa/0x14 [ 448.872736] ? setup_fault_attr+0x200/0x200 [ 448.872750] ? wake_up_q+0x93/0xe0 [ 448.872768] ? __mutex_unlock_slowpath+0x2be/0x610 [ 448.872787] __alloc_pages_nodemask+0x239/0x2890 [ 448.872808] ? __lock_acquire+0x6de/0x3ff0 [ 448.872829] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 448.924387] ? blkdev_ioctl+0x11a/0x1a7e [ 448.928461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.933844] ? blkpg_ioctl+0x9d0/0x9d0 [ 448.937754] ? debug_check_no_obj_freed+0x201/0x482 [ 448.942787] ? lock_downgrade+0x720/0x720 [ 448.946951] cache_grow_begin+0xa4/0x8a0 [ 448.951027] ? setup_fault_attr+0x200/0x200 [ 448.955464] ? lock_acquire+0x170/0x3c0 [ 448.959466] cache_alloc_refill+0x273/0x340 [ 448.963781] kmem_cache_alloc+0x346/0x370 [ 448.967938] getname_flags+0xce/0x590 [ 448.971815] do_mkdirat+0x8d/0x2d0 [ 448.975364] ? __ia32_sys_mknod+0x120/0x120 [ 448.980116] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 448.985469] ? trace_hardirqs_off_caller+0x6e/0x210 [ 448.990490] ? do_syscall_64+0x21/0x620 [ 448.994453] do_syscall_64+0xf9/0x620 [ 448.998243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.003420] RIP: 0033:0x45d2d7 [ 449.006603] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.025492] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 14:46:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000", 0x24, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 449.033211] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 449.040465] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 449.048691] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 449.055956] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 449.063229] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0xf, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 449.224136] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue [ 449.252577] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 449.268529] EXT4-fs (loop2): group descriptors corrupted! 14:46:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x8000000000000000) 14:46:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x80140, 0x0) lseek(r0, 0x0, 0x1) 14:46:13 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0xc0, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000140000", 0x27, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 451.848094] FAULT_INJECTION: forcing a failure. [ 451.848094] name failslab, interval 1, probability 0, space 0, times 0 14:46:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0xec0, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 451.891551] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 451.914448] CPU: 1 PID: 18005 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 451.922372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.931733] Call Trace: [ 451.934335] dump_stack+0x1fc/0x2fe [ 451.937980] should_fail.cold+0xa/0x14 14:46:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x81) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) lseek(r0, 0x10010, 0x2) [ 451.941880] ? setup_fault_attr+0x200/0x200 [ 451.946165] EXT4-fs (loop2): group descriptors corrupted! [ 451.946209] ? lock_acquire+0x170/0x3c0 [ 451.955943] __should_failslab+0x115/0x180 [ 451.960200] should_failslab+0x5/0xf [ 451.960782] ptrace attach of "/root/syz-executor.0"[18021] was attempted by "/root/syz-executor.0"[18023] [ 451.963922] kmem_cache_alloc+0x277/0x370 [ 451.963944] getname_flags+0xce/0x590 [ 451.963960] do_mkdirat+0x8d/0x2d0 [ 451.963977] ? __ia32_sys_mknod+0x120/0x120 [ 451.989429] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 451.994807] ? trace_hardirqs_off_caller+0x6e/0x210 [ 451.999829] ? do_syscall_64+0x21/0x620 [ 452.003797] do_syscall_64+0xf9/0x620 [ 452.007677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.012869] RIP: 0033:0x45d2d7 [ 452.016674] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000140000", 0x27, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 452.035570] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 452.043283] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 452.050993] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 452.058246] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 452.065501] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 452.072757] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x33fe0, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 452.174626] ptrace attach of "/root/syz-executor.0"[18038] was attempted by "/root/syz-executor.0"[18039] [ 452.242309] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 452.256470] EXT4-fs (loop2): group descriptors corrupted! 14:46:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0xfeffffff00000000) 14:46:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:46:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:16 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x200009d0, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a04000000140000", 0x27, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 454.892777] FAULT_INJECTION: forcing a failure. [ 454.892777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 454.904617] CPU: 1 PID: 18058 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 454.912506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.921869] Call Trace: [ 454.924475] dump_stack+0x1fc/0x2fe [ 454.928123] should_fail.cold+0xa/0x14 [ 454.932029] ? setup_fault_attr+0x200/0x200 14:46:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x7ffff000, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 454.933453] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 454.936371] ? __mutex_unlock_slowpath+0xea/0x610 [ 454.936394] __alloc_pages_nodemask+0x239/0x2890 [ 454.936420] ? __lock_acquire+0x6de/0x3ff0 [ 454.959678] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 454.964535] ? blkdev_ioctl+0x11a/0x1a7e [ 454.968605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.973984] ? blkpg_ioctl+0x9d0/0x9d0 [ 454.977893] ? debug_check_no_obj_freed+0x201/0x482 [ 454.982923] ? lock_downgrade+0x720/0x720 [ 454.987170] cache_grow_begin+0xa4/0x8a0 14:46:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 454.991241] ? setup_fault_attr+0x200/0x200 [ 454.995571] ? lock_acquire+0x170/0x3c0 [ 454.999568] cache_alloc_refill+0x273/0x340 [ 455.000278] EXT4-fs (loop2): group descriptors corrupted! [ 455.003911] kmem_cache_alloc+0x346/0x370 [ 455.003931] getname_flags+0xce/0x590 [ 455.003949] do_mkdirat+0x8d/0x2d0 [ 455.003967] ? __ia32_sys_mknod+0x120/0x120 [ 455.025311] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 455.030690] ? trace_hardirqs_off_caller+0x6e/0x210 [ 455.035723] ? do_syscall_64+0x21/0x620 [ 455.039711] do_syscall_64+0xf9/0x620 [ 455.043553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.048752] RIP: 0033:0x45d2d7 [ 455.051955] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.070867] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 455.078680] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 455.085961] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:46:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0xfffffdef, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe00000000f500001c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000080000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f00000000c0), 0x492492492492627, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x1f50, 0x7, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x33}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x5c}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x6}]}, @NFTA_RULE_EXPRESSIONS={0x144c, 0x4, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8, 0x1, 'dup\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xc}]}}]}, {0x6c, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @void}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x10}, @NFTA_MASQ_FLAGS={0x8}]}}, @lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x2a}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x9}]}}]}, {0x24, 0x1, 0x0, 0x1, [@nat={{0x8, 0x1, 'nat\x00'}, @void}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x2}]}}]}, {0x54, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @void}, @socket={{0xb, 0x1, 'socket\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x11}]}}, @log={{0x8, 0x1, 'log\x00'}, @void}, @notrack={{0xc, 0x1, 'notrack\x00'}, @val={0x4, 0x2, 0x0, 0x1, ["", ""]}}]}, {0x28, 0x1, 0x0, 0x1, [@osf={{0x8, 0x1, 'osf\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x7f}]}}]}, {0x60, 0x1, 0x0, 0x1, [@log={{0x8, 0x1, 'log\x00'}, @void}, @limit={{0xa, 0x1, 'limit\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @nat={{0x8, 0x1, 'nat\x00'}, @void}, @byteorder={{0xe, 0x1, 'byteorder\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x4c}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x6e}, @NFTA_BYTEORDER_OP={0x8, 0x3, 0x1, 0x0, 0x1}]}}]}, {0x12a4, 0x1, 0x0, 0x1, [@reject={{0xb, 0x1, 'reject\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REJECT_ICMP_CODE={0x5}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x9}]}}, @masq={{0x9, 0x1, 'masq\x00'}, @void}, @log={{0x8, 0x1, 'log\x00'}, @void}, @immediate={{0xe, 0x1, 'immediate\x00'}, @val={0x1130, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x194, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x81, 0x1, "632abdcfa4c98fc7dca8d07306b57453074cacd00ec8ac865e9c7c08f3a5367f54cb8c8fb41e4b3736f62de70323b94ffe90beb17509ebd1e6a96031eea5e28fe53e319f98910dd5258f7eb1bcb6b3c675510b9f11dc924383b72551444234e33424ab64e88e98808c0da545198880ee20560bd9a22ae220793a258f11"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x9a, 0x1, "7cf1a1e7bbc9fc6119099c539a4a57e730651de3529707cadfcf146b67d613a7ea733797bc5ac45eca24288147fb9e499c4c8a24d3fb98a271b785494bcc2f7740adb3088bd575d10de9c4fa246b09040ab3bbb0e5b4fb1485ba0e40a1ef74f384fdbf963f6edf563ef15638b5cf230326e72a853ea7c36a59ef0b4ad854f515db46fb3c903732e757e9d5661a7d2cb9868b6f27a2d3"}]}, @NFTA_IMMEDIATE_DATA={0x1fc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe6, 0x1, "79604034781dddda1a6ae49aff9163cca190ec87ba20fa215fad5b5e98eaf30d63fce7b8eb30315880a2e5d74dadedb3e8650508e2bdf8f9270c2beabe2beae35da1d4b089ae50ccebb7a7ee6b760a8d82d6056a781e54f9ef2daa47217953d9fe0bf47aadb48d23c0201fa4e6f970605db4d6d4add1ffd7208a995a103fbcd683d87080f90cd60ebd971c52bef26d77c215c465401d265b4ef2583677d96b9a7311729d691fe335cad24fb3e4442d775ac707923bf8f00d230225cc81170fd3f0c15c4dbfb4a9053604bbd15fbe14860ab9217c60c258c3cc349771ac9694e98495"}, @NFTA_DATA_VALUE={0x24, 0x1, "986c6f7495239ade6b0ed7e560aa399dcb3cddb3c64e3a813311cec41fdbce18"}, @NFTA_DATA_VALUE={0x7a, 0x1, "e89d2db09636615f20009369687459b0066db8737795e8ec0e9f03ef93998f3783851b392277369dede80b471837e3edbeca462ce8bd2e33013a2e0b4150952213797bde2de156cfc7d84ddad7fdf94418346fa24f3f90073014e00a35607c17b1deb00918703b3d45d6772ad89e1cac862cf8a66e34"}, @NFTA_DATA_VALUE={0x3e, 0x1, "96b65fd9b5125e08851cb6c40ab0a3f24d0f3d4b9ce8630106b8516a5c0791926c98a93cd1874933911340fd0553faeb7d83fb7bc11e194282d0"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_IMMEDIATE_DATA={0x4b0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6c, 0x1, "571b6c3cdea5e2b83ba40c6447917499ac5a32b72361c56048bdca59ee3ce3f782bf33618926bfa8998a1efbe65dc4ef0516b79e1257cb1e38975dd7ed983db21e585245feab4ec7e78fa413c98057c959a91ef4d6bd726196639c744a396dcebc98a07c8a8f79a8"}, @NFTA_DATA_VALUE={0xdd, 0x1, "bb13a6fe33aae2433175d78e5d11bac55c2a0a608a2890c23b68ce4a702414db98c203a06c96c5785c02264b0a606e91fdaf51f17d73d23d552454e149bc13b432b80fcb0691f6674ae1b98647d91ebe686b7ed7a6644c353bd98e11fd15cf933ead3ec7ce20c573198f647d6cdb1fd3ef1630a28e75328442d2adb0e03fcb4d61550e002b98501035f42a83517e6a9e8206b699671adb6e4384f36c7b90a7f3e646d276fea206b1f5969c80d184bf0f9806d5a54b3fdb258792e260cc9e4ab09931b6376938978de19007579fa405a07e4050c76f7b6b46ef"}, @NFTA_DATA_VALUE={0x60, 0x1, "82f4c07be97f72de6a1ac25c0b29827ed7573d2a04e3bbbf129a2527e49d1ea75b0831ee9766b9fb913990d39e6db2323c70f274051e343e4baba5ce8795cac92e3cf213f66f292c7f56d5f805cef53f4efe0ff8a18e55a20c9193e5"}, @NFTA_DATA_VALUE={0x7e, 0x1, "badd84f3b7a1de7ea5ba77f4c338f2e2130edf93dfded13f48dafd9f7c49c10ea8fb8608bb44566b9b56a5c2dbc6d9abaee97c0da598f04cb7ac110498d3c642239ca94cbf9f6c1af9318665f39dd3d37d0bd20bdb3b435e453176203ae26ca43b5821f66fac6ddbdc2d2f3e03dadb84f987d07c529cf12f7891"}, @NFTA_DATA_VALUE={0x96, 0x1, "699672b744e952c2f8b64aa7418f1ec48d8540cae25239f972740e002863a616fa811054ec67b9c2824dc1020ebb05eb4cdbe7255e18c122566769707114f27104985cbb061d8573e3e2f23e8c5a8b538af121f9efdfba39d21bf199530ff62c75092ca4308b0a6ae33d2b5f836307e05b4a653c6dd57b463e659c199875971857b917956412146d27f78187540e14693653"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x84, 0x1, "bf39e6c6c9d7b75f9baf4f5613d21ef5f27203b671732ad1759314191d1ffdf4906fdb7b4378a7cf8ce34912630243852517cc794f3ff84bd82313ff8642a5e74669ee2b450d961889c3c155f042c5b58193f6fdf361c38d18c20c24e8e9c92c2470a8978a738ef173d28eb1d81bf3882e24f6c68d6bc6e5adcd94e92b2f5aaa"}, @NFTA_DATA_VALUE={0xae, 0x1, "01a14cbec2da8a2c100d57bfd638ee2f81adf947a9e39b972ca5175543ae90883cf4bc0ac15a5a907dc04a412aba959ef38d367d3c78a80f777b4735b26a73bb0658c85b44cad81ad7f03da34a8f1f9870cdd4425b9cd25577ad39950c959f2eb0164658ceb937fb0e80ab5a449781adbd0de77a8e3077c7c0cdb5159e6c03d9887d97ff0f78afdc17d455b73fb4bb0926b56e9450ddabb5dfaf89d7860e8b180ea48b531708d1befd7c"}, @NFTA_DATA_VALUE={0x80, 0x1, "6a89e39bc2dcf142d382ceff156bf5990107f4d4a91bbbca9911829d0fb1060ce741c7723fcefa8932126d2da4fa96c62705b1b46c58e48756e42556f60e8a2747616f7fa59a8d145f52cd609a160070d76b2106ef8a59d79c36876be42dcb2c85859bd38e3f2c261e3f86e9d718288c3113178fb9612885eaef9dcd"}, @NFTA_DATA_VALUE={0x5, 0x1, "82"}]}, @NFTA_IMMEDIATE_DATA={0x298, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x9db4d5f1fb8e5ca1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x6c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xe3, 0x1, "d2188519d98422c4196251db717011f5dd4b5113521999a43724c5373eed20fd5a59b3394b584a6963d989be6b82f016c852a1187e258571e4166dc0979d98c5ce8977e17be65301d13a8731f7d344b891099cd09a84699ad9ea56f8bbaf8e340675cdfebee3a075962a3b62440e485c297f81f2dc9fd37ce6ca79ec1a49d523b4a14bf1b10f5f46642a5e7e111ad311f323a83135f99b2985dd95a9def3d81ca2b9c0c0ba06efed5d495f79cf0cb0667ecd9639fe33ba1dddfbea82e284287b4f3aafce95f140d4ca19d25def750d6392d45827d7008a7d81e17cde1edb67"}, @NFTA_DATA_VALUE={0x82, 0x1, "1861645db4b9f5bea9c41dad3d66bc7595015d4a73f0bcfe758069c47d3aba6b03e3e215f93c12b074d0aa990914949985de675c9b100fe958ea9f26541212e1072f37113afe4eb4d6ed30750a35cb0ea00f8a1d1fe2af73d91740f4730881c807fd0b7f6f2f7b6523f0b0cda047755d15313ad110b7f2badb6e0694834b"}, @NFTA_DATA_VALUE={0x9, 0x1, "cf8357ffb0"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x2f, 0x1, "2308b4044acd78777d91a1f2cbfe417c9829a1d5d7655655ef52a6e0819979ab8037078303593640854d6d"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_IMMEDIATE_DATA={0x22c, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc3, 0x1, "daa864dac2e8a693f550ce5d0a127bad581ad5e279e7624d0788d62e42b7bc3a0e184aa87b9ed0e21f80666d15a5fc1f6b2d36f3f51651ac4a724220cadced4c2945462bb4f96c4991d28857e33d93fb703500a1dfb68db8527c5b8f8c29215b63e26a5183ed8101c2263731d2ce9e875618e2095cf34002c2c853b921f980da4b9d22eb2862ccd04c52e6979d89ec0dbca4cb06c24520addd9204fb8bbf5aabe588b05ca1a5942248dacd3c86d989bbb18ee43d283e8b91cdcaf47aa48829"}, @NFTA_DATA_VALUE={0x4d, 0x1, "7924392b824750d18ced9d3320977e091ca334003c75fa4f4196b708fe568bbaf348c709be279dd0544b01025caff3a2656b1dc984286971a81d79240b1e384b933282ab7b9702b71c"}, @NFTA_DATA_VALUE={0x12, 0x1, "b9b5c1c336ae118f171001690aa1"}, @NFTA_DATA_VALUE={0xcd, 0x1, "cbd51f102d7571d9170902cd8a00c74b315a30350207e5d1ea84ff94e26b23b43f1fca6af8cb676bce0bc225498f612bb3df1462d5fc9ef85824eef55f887bab6590e31704212b7ea5d7d32750f96eeac54061f19cd5b1809c5054f4b9d0c4ea9cccdde753a7d7e736e6ad31d5804c6cf7a064f978a5b8241ef7a21abb98325023e7c7cf092ccee4c9056b5fcf7bbcd517bce34e048ed7943b20be60a24c2e3b5f6d1269d7baba64a94748cedb24e82bceaecdb7a439106ca302a3ee7eb9a0dc84c17cdc0a91c246de"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_IMMEDIATE_DATA={0x418, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xaf, 0x1, "2e2bb39f85ba767075cb06ab23b9af886b313f6e855982d58434165e4e1d66d66f76cad488b291020f1e921e628314aa28aa19c9f336c6c690a4bd79f254237ca410a1ee09038b421333e5840ef023567c823d1f7451a9f7122e0668dcc2d583343cbf25cfc05c3997f07f4ec620db8d6a2cad769699f51daed3444a0a0a7d0e5cdeeda7c440f3012d7d12622b41cadd3e80f848360ca028591e9881d1495085cc7e7754f92b8732c73356"}, @NFTA_DATA_VALUE={0xff, 0x1, "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"}, @NFTA_DATA_VALUE={0xb3, 0x1, "967c7625aa2d099a5ba6e9bb3b42be5d3f8a8bcf24b27e0212e2eb18ceebbde19a7adc3a3fcbecaffe08f17e13edd5e2aebe10f9b565c3b289c3fe66ef8a653658c6346a4905ad3befd251db99ff798e106edc8cc012f310bd6163bdac5f9f8af7b40d0ccdc98b4c7a0fcc2769d506fb2d20be3bdffcab34fbc8c967a4727141bd361f7362ef310853ef96c567d99c5c73b5b64a982c144c0ff7a2e87a3a3fdc1a53d280847eff3074f5d63ad005fa"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x9a, 0x1, "afb34c3ee8aeeaccd6564bfb172327d59e2d43a992d5b8208d633893b7016455e64442fb845f275a7bdaaa63cccf1552e9fe6dbff5f273b14c15e2e900fb72571fefcc162854b1f1badfcf28f3d5d5653dd25f411e89e921c7c449a66f6cd3d62380ecd285c24c1ded68272acaab895ebbd03b6d49ff112949bb5c516dce2be5cab1220f845c345a0c4eecbb09dd8b52f2bc9d103903"}, @NFTA_DATA_VALUE={0x99, 0x1, "4e66432d12f2bb6e301d2b1244b2aeb012c6bf590ca212cf96bebcabb7c15be78a4c666eb10508f06bb39a2f6730e513fb2e49599a5c1b327e34de72b37f82129a06aa28e18d1deb89d3629e67a21af2c81b2f6cbcf3c5882a33d7b333dc93fe7b762f060b6b2945bae610c52c46991d00b7d3adb3c03e2018a87f3c63bbc5e0922abe50aa52c1a268a30a3dee2e4167e4cb8cd766"}, @NFTA_DATA_VALUE={0x6c, 0x1, "357f52a9a29fde27209621ce68113791ad80006fe7771151a2cedaa465a2a60da0654580287c3fc271a6d746a2dbdc9238af32d23041d11d50518d608d80edea034bac2555521391fc8a6792485cec5b03b5b63919a4509c70bacfab6f5798543ea70105036b9f59"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xb}]}}, @objref={{0xb, 0x1, 'objref\x00'}, @val={0x50, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0xe}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz1\x00'}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJREF_IMM_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz2\x00'}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz1\x00'}]}}, @rt={{0x7, 0x1, 'rt\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x39}]}}, @match={{0xa, 0x1, 'match\x00'}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0xa, 0x1, '/)!.!\x00'}]}}, @limit={{0xa, 0x1, 'limit\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_TYPE={0x8}, @NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0x101}, @NFTA_LIMIT_TYPE={0x8}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x100}]}}, @log={{0x8, 0x1, 'log\x00'}, @void}, @exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_FLAGS={0x8}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}]}]}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_EXPRESSIONS={0xaa4, 0x4, 0x0, 0x1, [{0x9e4, 0x1, 0x0, 0x1, [@bitwise={{0xc, 0x1, 'bitwise\x00'}, @val={0x97c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_XOR={0x238, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x20, 0x1, "fff51dd5288a75ef27d75084e78212c428d5a6e73a61f49acc97aa2a"}, @NFTA_DATA_VALUE={0xe8, 0x1, "d788797110d02e275a78780ac5147f3d19dcdf8b5953109150fa6537833be65f1748f44adbd38815e5160913e4b539a817884f3b482ea507de4b9584dd2f69e82ec101b72d09a952160350405c329d736bda521d743f621cd38b1b034ed3197c8082a6ca8f8a5079d4c83030f521b2ff215bc0933a313593c9d69fbc92d3c20af3bfb3608de97c83d0eb4fde4eab54be7d8e9ac4a9334655ddc6b88698afd04c87fc9cc96038becb7e1ea98880174b66b9759504ec8879d1a9ef549f9fa6399bb2ac6e1b79b8e4c3cc65a4aa724651a216b5a2b0768917e6c0ac9aa5a98f7ca9199564fe"}, @NFTA_DATA_VALUE={0x76, 0x1, "c6a3a0c16c9b65d8a4d3facd877c16f786ed857d6482d71d8323089f2f77aba28910c1d65a53b4d4be1eaa80132e3e858a177757c0c0d9ad284e8bd7e7d7407ac514684d74f1d67faf5f167ec800ae7a6cc45e2e092e26db6cb003b59cab372c99137f7ed9df6fe463a1c92950de18721752"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x80, 0x1, "b16ac26e0d9f0a40ff530199e93a54dfa0f241717004639dcea9cba1341fcfd8a27e8d0232367d611830f655b95f92a9721dd579aff2ee539d944d161029e529478728466c34c9475bb415f6ca83ac8bf3670e90ae910016edb59fa09536eb4a4efc5097eff3f14ce1e3694d6b34a4ec78a6ab4a2b9563315f4c9ea2"}, @NFTA_DATA_VALUE={0x27, 0x1, "148e8b8652e64103ad0a66ddb5d81457c5608aa6bed6118a356eb1e65fbe6a19acf361"}]}, @NFTA_BITWISE_MASK={0xa4, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa0, 0x1, "be6804bcc748a73d731cbfd8c87f8f74cbbd457de1068a68a4e7aa00e231684291c7fe0a254e3d56188495fd7f898703af15603d614bd04d47d636d47ce0e163b167e8557371f750ab56917ddc6678170c498f70bd627eda34a026e5ab0985a794f95e0d49e1281f25155c147d9e73fdf729417db99fa96a7c193e4f7e6389b807638045303be0cf771b8136b1ebfc05154d70f3edef550a2729b051"}]}, @NFTA_BITWISE_MASK={0x100, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x89, 0x1, "431b24e545ebeb36acac4e28a2cbdfc794dfc3555c3268f9f53d0eb0b024d870751dcd32479b1689626a064170f35fdbb90e2504243a5a681a7edec0deefc4451d645fac358a7e281c918aedca4c1320907f00ded40d571ffa701687c76d1a11fc004b8d2f56d4e1e9b3740ab43250608dfe1fb7648157fc388d61224495f6aae4fc17ae4d"}, @NFTA_DATA_VALUE={0x6e, 0x1, "6cd105f2d6ba6c100a8383fced09dbcc998446017a47f8ea5f4695533b351785260600f484268f30e1a8f4342639f0b971ddfb954a551aaf653a4ef87d777d13a9be23c8a929cda0822172aba7a223d396f2816e3c55a2a9b352cffc3d6827ebc7210f598cbee8ea32d3"}]}, @NFTA_BITWISE_XOR={0x3b0, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd7, 0x1, "facbd5507defab61f4cb6d383b93e03785961dbece8040cad79eeec098a62e7d953dab64897b02419b73cb10e3e7a13a88a61422eba62ec0fc804080f163e1b3794d5c3c154e2084b0a1a6252c13b80ca0d27a5676b937091b84a01a9c5b4d290d451ea1730bf9a26df7c0ad76bb5f66f2df6a98f864fac05a905fbe36499682c0d99cc162fc4f4dde5ba2efaecae7ddece8a922142a577cb25b6ecaf678c4c8e844a27ebc69e2bb572287c0fab07f3460307dceedd6dceff99d1b41ed4fa732f7424e09a92883a8f2f7363653e385fdee3dc4"}, @NFTA_DATA_VALUE={0x13, 0x1, "3e7c1ece0c611ec2ad639e02abfaaf"}, @NFTA_DATA_VALUE={0x42, 0x1, "51bb832bd87d3033b15feed010413b9206aa381579670e39a9a2eab4456a6ee2e011089bf1bbfc867453f5ee2a7a821cbcff5d9bf3313b6df43dc201e06c"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x102, 0x1, "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"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xed, 0x1, "dd6be1c332924a9e9cee21f40f1c42150b73e24894977fb0d8bba20c99e49c6ef8af57e5936433a799668a968286b6f7d4ec1c20098c7bb45ba043b5111f831257022bdf190ac1700ecdd85dafdb4e0317d943c745b3277a52a328003da869bc165143a2c6e889cb5f2d51744f04b9f02712e34cb9d52e18c8323c78f6ef73688392b5e466e8620f6f8972a049dfeb52dac9da7906ea011b74f1674997c130132a4d2767f5fe6888932f9b20c09e976b4ee5a58f103ea4f7d0142193027b3f193df27602a72744e49cd203e5342401a0c23039695376b5bc4ea96cef03139f507678173625eadbb7b8"}]}, @NFTA_BITWISE_MASK={0x1d4, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa8, 0x1, "7d38adf4679bb01911fb9266a055bdcdaa20e53b58a1e3b6d5fc96a433ce9f4fa4ea7e25409b9cc2efa29e7190da0ddd6b2c94a775907be46e89c753d9a4f13d61b6463c7834e15f72867496737c5dee703560ff756d5177c4ff7cae7329d1dd753e595256ed8ed51a14451ac0335a223a55b869c6e782d493901c78f95f8a5aac603cd1b482a4de88d9e1e55fd16010617b5063c386df613bafb516d62b622a23161d93"}, @NFTA_DATA_VALUE={0x72, 0x1, "9a22a6f444a6c39454fb226003b835a17c138cd59b4b28d91af45a4c15bd1e59a3228ea0eefc88c9d759655c3434167161b68d3409b732bf547f4d93f45f2895079443e8539e6d80ade2744fd577e407ff6f590e60b580ebcfa7b5d69b1aa608cb20846035fe8cf2dee898c96b7a"}, @NFTA_DATA_VALUE={0x6b, 0x1, "6ade6756a73fd82e9c5f168b0a80732e3f34f4599e36d533173a0e4a29ec0e44e43bb9c64a26ecf816bc679b5149f803eada515b6e65f1af59d8369027d642ff07b662faeadb98586ba9d992e85a1a55ed046fc0dcf64078e29ef25c2a518ea37ceeb9b9059025"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x1ff}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_TTL={0x5, 0x2, 0x5}, @NFTA_OSF_TTL={0x5, 0x2, 0x3f}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x19}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_OSF_TTL={0x5, 0x2, 0xdf}, @NFTA_OSF_FLAGS={0x8}]}}]}, {0xbc, 0x1, 0x0, 0x1, [@fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @nat={{0x8, 0x1, 'nat\x00'}, @void}, @rt={{0x7, 0x1, 'rt\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @void}, @meta={{0x9, 0x1, 'meta\x00'}, @void}, @socket={{0xb, 0x1, 'socket\x00'}, @void}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xe5a}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @fwd={{0x8, 0x1, 'fwd\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_FWD_NFPROTO={0x8, 0x3, 0x1, 0x0, 0x2}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @void}]}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x8001}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}]}, 0x1f50}, 0x1, 0x0, 0x0, 0x4000000}, 0x41054) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r7, 0x14301}}, 0x20}}, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r8 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r8, 0x0, 0x1) 14:46:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 455.093242] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 455.100525] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 455.107807] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a0400000014000000", 0x28, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 455.202554] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue [ 455.242627] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 455.320496] bond1: making interface veth5 the new active one [ 455.326832] bond1: Enslaving veth5 as an active interface with an up link [ 455.349576] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 455.359918] bond1: Enslaving veth7 as a backup interface with an up link [ 455.365358] EXT4-fs (loop2): group descriptors corrupted! [ 455.397016] device bond1 entered promiscuous mode [ 455.416999] device veth5 entered promiscuous mode [ 455.430313] 8021q: adding VLAN 0 to HW filter on device bond1 [ 455.443487] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 455.460202] bond1: Enslaving veth9 as a backup interface with an up link [ 455.477445] bond1: Enslaving veth11 as a backup interface with an up link 14:46:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0xffffffff00000000) 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0xf, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:19 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a0400000014000000", 0x28, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x26, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 457.994374] FAULT_INJECTION: forcing a failure. [ 457.994374] name failslab, interval 1, probability 0, space 0, times 0 [ 458.016552] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 14:46:19 executing program 1: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101200, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x88802) r2 = socket(0x27, 0xa, 0x400) getsockname$netrom(r2, &(0x7f00000000c0)={{0x3, @rose}, [@bcast, @rose, @null, @remote, @netrom, @default, @remote, @bcast]}, &(0x7f00000001c0)=0x48) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r1, 0x40096100, &(0x7f0000000040)={{}, 0x9}) [ 458.053419] CPU: 0 PID: 18172 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 458.061339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.070699] Call Trace: [ 458.073305] dump_stack+0x1fc/0x2fe [ 458.076952] should_fail.cold+0xa/0x14 [ 458.080855] ? setup_fault_attr+0x200/0x200 [ 458.085197] __should_failslab+0x115/0x180 [ 458.089441] should_failslab+0x5/0xf [ 458.093163] kmem_cache_alloc+0x277/0x370 [ 458.097325] ? ext4_sync_fs+0x8d0/0x8d0 14:46:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 458.101322] ext4_alloc_inode+0x1a/0x630 [ 458.105393] ? ext4_sync_fs+0x8d0/0x8d0 [ 458.109376] alloc_inode+0x5d/0x180 [ 458.111196] EXT4-fs (loop2): group descriptors corrupted! [ 458.113008] new_inode+0x1d/0xf0 [ 458.113039] __ext4_new_inode+0x400/0x5a20 [ 458.126450] ? putname+0xe1/0x120 [ 458.129909] ? do_mkdirat+0xa0/0x2d0 [ 458.133634] ? ext4_free_inode+0x1780/0x1780 [ 458.138056] ? debug_check_no_obj_freed+0x201/0x482 [ 458.143077] ? __dquot_initialize+0x298/0xb70 [ 458.147680] ? lock_acquire+0x170/0x3c0 [ 458.151667] ? dquot_initialize_needed+0x290/0x290 [ 458.156651] ? trace_hardirqs_off+0x64/0x200 [ 458.161068] ? common_perm+0x4be/0x800 [ 458.164978] ext4_mkdir+0x396/0xe10 [ 458.166489] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 458.168611] ? putname+0xe1/0x120 [ 458.168632] ? ext4_init_dot_dotdot+0x600/0x600 [ 458.168652] ? generic_permission+0x116/0x4d0 [ 458.168665] ? security_inode_permission+0xc5/0xf0 [ 458.168681] ? inode_permission.part.0+0x10c/0x450 [ 458.168698] vfs_mkdir+0x508/0x7a0 [ 458.168715] do_mkdirat+0x262/0x2d0 [ 458.168730] ? __ia32_sys_mknod+0x120/0x120 [ 458.168746] ? trace_hardirqs_off_caller+0x6e/0x210 [ 458.168764] ? do_syscall_64+0x21/0x620 [ 458.220416] do_syscall_64+0xf9/0x620 [ 458.224230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.229522] RIP: 0033:0x45d2d7 [ 458.232700] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x2, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 458.252722] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 458.260537] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 458.267804] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 458.275060] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 458.282322] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 458.289600] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a0400000014000000", 0x28, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x8, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:19 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x300, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 458.507313] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 458.509679] FAULT_INJECTION: forcing a failure. [ 458.509679] name failslab, interval 1, probability 0, space 0, times 0 [ 458.562722] CPU: 1 PID: 18211 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 458.565762] EXT4-fs (loop2): group descriptors corrupted! [ 458.570728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.570733] Call Trace: [ 458.570755] dump_stack+0x1fc/0x2fe [ 458.570774] should_fail.cold+0xa/0x14 [ 458.570790] ? setup_fault_attr+0x200/0x200 [ 458.570804] ? lock_downgrade+0x720/0x720 [ 458.570824] __should_failslab+0x115/0x180 14:46:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 458.570839] should_failslab+0x5/0xf [ 458.570855] __kmalloc+0x2ab/0x3c0 [ 458.616918] ? ext4_find_extent+0x9bb/0xc70 [ 458.621256] ext4_find_extent+0x9bb/0xc70 [ 458.625420] ext4_ext_map_blocks+0x1c0/0x7390 [ 458.629917] ? __lock_acquire+0x6de/0x3ff0 [ 458.634145] ? mark_held_locks+0xf0/0xf0 [ 458.638207] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 458.643692] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 458.649123] ? mark_held_locks+0xf0/0xf0 [ 458.653187] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 458.658095] ? ext4_es_lookup_extent+0x375/0xb60 [ 458.662877] ? ext4_map_blocks+0x59f/0x1a50 [ 458.667250] ? lock_acquire+0x170/0x3c0 [ 458.671236] ? ext4_map_blocks+0x740/0x1a50 [ 458.675549] ext4_map_blocks+0x7a2/0x1a50 [ 458.679682] ? check_preemption_disabled+0x41/0x280 [ 458.684693] ? ext4_issue_zeroout+0x160/0x160 [ 458.689175] ? __brelse+0x84/0xa0 [ 458.692625] ? __ext4_new_inode+0x2eb/0x5a20 [ 458.697043] ext4_getblk+0xad/0x4f0 [ 458.700686] ? ext4_iomap_begin+0xe00/0xe00 [ 458.705041] ? ext4_free_inode+0x1780/0x1780 [ 458.709492] ? debug_check_no_obj_freed+0x201/0x482 [ 458.714493] ? __dquot_initialize+0x298/0xb70 [ 458.718988] ext4_bread+0x7c/0x210 [ 458.722514] ? ext4_getblk+0x4f0/0x4f0 [ 458.726392] ? dquot_initialize_needed+0x290/0x290 [ 458.731655] ? trace_hardirqs_off+0x64/0x200 [ 458.736077] ext4_append+0x155/0x370 [ 458.739776] ext4_mkdir+0x5bd/0xe10 [ 458.743404] ? ext4_init_dot_dotdot+0x600/0x600 [ 458.748073] ? generic_permission+0x116/0x4d0 [ 458.752559] ? inode_permission.part.0+0x10c/0x450 [ 458.757472] vfs_mkdir+0x508/0x7a0 [ 458.761003] do_mkdirat+0x262/0x2d0 [ 458.764905] ? __ia32_sys_mknod+0x120/0x120 [ 458.769224] ? trace_hardirqs_off_caller+0x6e/0x210 [ 458.774229] ? do_syscall_64+0x21/0x620 [ 458.778203] do_syscall_64+0xf9/0x620 [ 458.782004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.787209] RIP: 0033:0x45d2d7 [ 458.790393] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(0xffffffffffffffff, 0x7b0, &(0x7f0000000000)={@host, 0x3}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file1\x00') r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0xa2, 0xfffffff9}, &(0x7f0000000100)=0xffffffffffffff68) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0x8) lseek(r0, 0x0, 0x1) [ 458.809359] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 458.817107] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 458.824366] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 458.831634] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 458.838913] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 458.846167] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:22 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$CHAR_RAW_PBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x200100, 0x0) lseek(r0, 0x0, 0x1) 14:46:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x2, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:22 executing program 5: syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0x11}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x3, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 461.213527] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x2, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="408bc6ae8b8088e334d71440c6d2f640a62d0aa29105c27f323845b6ed574f636498c2929c840d0c5fc6147df07e6f0ae8504c418b28b116ff19208d74a5932eb697a5315c26a7cf82b7b3855b0f1582d2bc6a161937031bbf92b9caf8d24c8a987cbef18080342f2cc459f847371e3ce0d2a9c9c5c55ef0db65ff63e6d7deb4f211e2510a667f13bd521085e903f8e84a30dabcf4213437aec604c28852956bee6804fc264854b36dea1442b0b5756b53aefaedbe46", 0xb6}, {&(0x7f00000001c0)="a07c28b78aca16e602980df0292444f033add1ee76c4bf69248466b1535eccbd6b44d83b2b", 0x25, 0x8}, {&(0x7f0000000200)="788d34ba83a7fcd3ae00981988141352c3462e1c4ac6dd82417dcd20f1ae052f2334d0bc315685ed3225fab26a21f25b11be9158dcac81cfb7e967c4442026d51f9eebd1fd4375645fd1b11d9380e28590c82fe17e1c", 0x56, 0x9}], 0x400, &(0x7f0000000300)=ANY=[@ANYBLOB="636f6e6669676673002ced119dabdb574fafec402a5e2c2c636f6e6669676673002c636f6e6669676673002c21292c636f6e6669676673002c5d2d2c6170707275626a5f726f6c65"]) 14:46:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000100)={0x3, 0x1, @start={0x3}}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 461.256448] FAULT_INJECTION: forcing a failure. [ 461.256448] name failslab, interval 1, probability 0, space 0, times 0 [ 461.303030] CPU: 0 PID: 18256 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 461.310948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.320310] Call Trace: [ 461.322912] dump_stack+0x1fc/0x2fe [ 461.326551] should_fail.cold+0xa/0x14 [ 461.330448] ? setup_fault_attr+0x200/0x200 [ 461.334787] ? lock_downgrade+0x720/0x720 [ 461.338974] __should_failslab+0x115/0x180 [ 461.343217] should_failslab+0x5/0xf [ 461.346937] __kmalloc+0x2ab/0x3c0 [ 461.350478] ? ext4_find_extent+0x9bb/0xc70 [ 461.354792] ext4_find_extent+0x9bb/0xc70 [ 461.358935] ext4_ext_map_blocks+0x1c0/0x7390 [ 461.363421] ? __lock_acquire+0x6de/0x3ff0 [ 461.367644] ? mark_held_locks+0xf0/0xf0 [ 461.371701] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 461.377051] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 461.382224] ? mark_held_locks+0xf0/0xf0 [ 461.386268] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 461.391101] ? ext4_es_lookup_extent+0x375/0xb60 [ 461.395862] ? ext4_map_blocks+0x59f/0x1a50 [ 461.400184] ? lock_acquire+0x170/0x3c0 [ 461.404197] ? ext4_map_blocks+0x740/0x1a50 [ 461.408512] ext4_map_blocks+0x7a2/0x1a50 [ 461.412660] ? check_preemption_disabled+0x41/0x280 [ 461.417661] ? ext4_issue_zeroout+0x160/0x160 [ 461.422153] ? __brelse+0x84/0xa0 [ 461.425601] ? __ext4_new_inode+0x2eb/0x5a20 [ 461.430001] ext4_getblk+0xad/0x4f0 [ 461.433616] ? ext4_iomap_begin+0xe00/0xe00 [ 461.437939] ? ext4_free_inode+0x1780/0x1780 [ 461.442335] ? _raw_spin_unlock_irq+0x24/0x80 [ 461.446818] ? __dquot_initialize+0x298/0xb70 [ 461.451302] ext4_bread+0x7c/0x210 [ 461.454854] ? ext4_getblk+0x4f0/0x4f0 [ 461.458727] ? dquot_initialize_needed+0x290/0x290 [ 461.463643] ext4_append+0x155/0x370 [ 461.467344] ext4_mkdir+0x5bd/0xe10 [ 461.470961] ? ext4_init_dot_dotdot+0x600/0x600 [ 461.475617] ? generic_permission+0x116/0x4d0 [ 461.480098] ? inode_permission.part.0+0x10c/0x450 [ 461.485015] vfs_mkdir+0x508/0x7a0 [ 461.488543] do_mkdirat+0x262/0x2d0 [ 461.492158] ? __ia32_sys_mknod+0x120/0x120 [ 461.496476] ? trace_hardirqs_off_caller+0x6e/0x210 [ 461.501492] ? do_syscall_64+0x21/0x620 [ 461.505453] do_syscall_64+0xf9/0x620 [ 461.509239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.514413] RIP: 0033:0x45d2d7 [ 461.517589] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.536473] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 461.544164] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 14:46:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x4, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 461.551680] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 461.558932] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 461.566185] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 461.573439] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:23 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 461.669269] affs: Unrecognized mount option "configfs" or missing value [ 461.676276] affs: Error parsing options 14:46:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x7, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 461.736706] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 461.749160] affs: Unrecognized mount option "configfs" or missing value [ 461.756184] affs: Error parsing options 14:46:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x8, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:23 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x220200) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000001740)={0xffffffffffffffff}, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000001780)={0x35}) lseek(r1, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/109, 0x6d) [ 461.854351] FAULT_INJECTION: forcing a failure. [ 461.854351] name failslab, interval 1, probability 0, space 0, times 0 [ 461.873210] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 461.896495] CPU: 1 PID: 18302 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 14:46:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xe, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 461.904426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.916486] Call Trace: [ 461.919089] dump_stack+0x1fc/0x2fe [ 461.922735] should_fail.cold+0xa/0x14 [ 461.926649] ? setup_fault_attr+0x200/0x200 [ 461.931340] ? lock_downgrade+0x720/0x720 [ 461.935518] __should_failslab+0x115/0x180 [ 461.939768] should_failslab+0x5/0xf [ 461.943495] __kmalloc+0x2ab/0x3c0 [ 461.947147] ? ext4_find_extent+0x9bb/0xc70 [ 461.951567] ext4_find_extent+0x9bb/0xc70 [ 461.955732] ext4_ext_map_blocks+0x1c0/0x7390 [ 461.960241] ? __lock_acquire+0x6de/0x3ff0 [ 461.964491] ? mark_held_locks+0xf0/0xf0 [ 461.968561] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 461.973945] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 461.979139] ? mark_held_locks+0xf0/0xf0 [ 461.983207] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 461.988064] ? ext4_es_lookup_extent+0x375/0xb60 [ 461.992830] ? ext4_map_blocks+0x59f/0x1a50 [ 461.997162] ? lock_acquire+0x170/0x3c0 [ 462.001143] ? ext4_map_blocks+0x740/0x1a50 [ 462.005483] ext4_map_blocks+0x7a2/0x1a50 [ 462.009632] ? check_preemption_disabled+0x41/0x280 [ 462.014659] ? ext4_issue_zeroout+0x160/0x160 [ 462.019163] ? __brelse+0x84/0xa0 [ 462.022626] ? __ext4_new_inode+0x2eb/0x5a20 [ 462.027049] ext4_getblk+0xad/0x4f0 [ 462.030688] ? ext4_iomap_begin+0xe00/0xe00 [ 462.035019] ? ext4_free_inode+0x1780/0x1780 [ 462.039434] ? debug_check_no_obj_freed+0x201/0x482 [ 462.044456] ? __dquot_initialize+0x298/0xb70 [ 462.048967] ext4_bread+0x7c/0x210 [ 462.052514] ? ext4_getblk+0x4f0/0x4f0 [ 462.056403] ? dquot_initialize_needed+0x290/0x290 [ 462.061350] ? trace_hardirqs_off+0x64/0x200 [ 462.065770] ext4_append+0x155/0x370 [ 462.069479] ext4_mkdir+0x5bd/0xe10 [ 462.073121] ? ext4_init_dot_dotdot+0x600/0x600 [ 462.077779] ? generic_permission+0x116/0x4d0 [ 462.082352] ? inode_permission.part.0+0x10c/0x450 [ 462.087270] vfs_mkdir+0x508/0x7a0 [ 462.090801] do_mkdirat+0x262/0x2d0 [ 462.094419] ? __ia32_sys_mknod+0x120/0x120 [ 462.098730] ? trace_hardirqs_off_caller+0x6e/0x210 [ 462.103745] ? do_syscall_64+0x21/0x620 [ 462.107803] do_syscall_64+0xf9/0x620 [ 462.111607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.116784] RIP: 0033:0x45d2d7 [ 462.119964] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.138944] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 462.146645] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 462.156591] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 462.163844] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 462.171184] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 462.178443] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x4) 14:46:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:25 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r1, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:25 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='romfs\x00', 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) 14:46:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x60, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 464.673533] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 464.734238] FAULT_INJECTION: forcing a failure. [ 464.734238] name failslab, interval 1, probability 0, space 0, times 0 [ 464.745969] CPU: 0 PID: 18351 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 464.753881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.763238] Call Trace: [ 464.765835] dump_stack+0x1fc/0x2fe [ 464.769479] should_fail.cold+0xa/0x14 [ 464.773384] ? setup_fault_attr+0x200/0x200 [ 464.777728] ? __es_tree_search.isra.0+0x1af/0x210 14:46:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x300, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)) [ 464.782679] __should_failslab+0x115/0x180 [ 464.786923] should_failslab+0x5/0xf [ 464.790648] kmem_cache_alloc+0x3f/0x370 [ 464.794724] __es_insert_extent+0x39b/0x13b0 [ 464.799161] ext4_es_insert_extent+0x22e/0x5e0 [ 464.803755] ? ext4_map_blocks+0x59f/0x1a50 [ 464.808091] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 464.813913] ext4_map_blocks+0xa2a/0x1a50 [ 464.818071] ? ext4_issue_zeroout+0x160/0x160 [ 464.822575] ? __brelse+0x84/0xa0 [ 464.826027] ? __ext4_new_inode+0x2eb/0x5a20 [ 464.830444] ext4_getblk+0xad/0x4f0 [ 464.834068] ? ext4_iomap_begin+0xe00/0xe00 [ 464.838388] ? ext4_free_inode+0x1780/0x1780 [ 464.842789] ? debug_check_no_obj_freed+0x201/0x482 [ 464.847813] ? __dquot_initialize+0x298/0xb70 [ 464.852329] ext4_bread+0x7c/0x210 [ 464.855864] ? ext4_getblk+0x4f0/0x4f0 [ 464.859747] ? dquot_initialize_needed+0x290/0x290 [ 464.864687] ? trace_hardirqs_off+0x64/0x200 [ 464.869094] ext4_append+0x155/0x370 [ 464.872805] ext4_mkdir+0x5bd/0xe10 [ 464.876421] ? ext4_init_dot_dotdot+0x600/0x600 [ 464.881080] ? generic_permission+0x116/0x4d0 [ 464.885582] ? inode_permission.part.0+0x10c/0x450 [ 464.890522] vfs_mkdir+0x508/0x7a0 [ 464.894065] do_mkdirat+0x262/0x2d0 [ 464.897713] ? __ia32_sys_mknod+0x120/0x120 [ 464.902034] ? trace_hardirqs_off_caller+0x6e/0x210 [ 464.907039] ? do_syscall_64+0x21/0x620 [ 464.911005] do_syscall_64+0xf9/0x620 [ 464.914807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.919990] RIP: 0033:0x45d2d7 [ 464.923192] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.942079] RSP: 002b:00007fa358562a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 464.949779] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000045d2d7 [ 464.957061] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 464.964330] RBP: 00007fa358562ae0 R08: 0000000020000260 R09: 0000000000000000 [ 464.971600] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000080 [ 464.978863] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 465.050617] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:26 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x353, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 465.092752] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 465.243236] FAULT_INJECTION: forcing a failure. [ 465.243236] name failslab, interval 1, probability 0, space 0, times 0 [ 465.303675] CPU: 1 PID: 18384 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 465.311590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.320974] Call Trace: [ 465.323577] dump_stack+0x1fc/0x2fe [ 465.327223] should_fail.cold+0xa/0x14 [ 465.331135] ? setup_fault_attr+0x200/0x200 [ 465.335464] ? lock_acquire+0x170/0x3c0 [ 465.339486] __should_failslab+0x115/0x180 [ 465.343729] should_failslab+0x5/0xf [ 465.347450] __kmalloc_track_caller+0x2a6/0x3c0 [ 465.352122] ? strndup_user+0x70/0x120 [ 465.356044] memdup_user+0x22/0xb0 [ 465.359688] strndup_user+0x70/0x120 [ 465.363411] ksys_mount+0x34/0x130 [ 465.366961] __x64_sys_mount+0xba/0x150 [ 465.370942] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 465.375534] do_syscall_64+0xf9/0x620 [ 465.379345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.384536] RIP: 0033:0x46090a [ 465.387730] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 465.406636] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 465.414355] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 465.421633] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 465.428912] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 465.436190] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 465.443463] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x700, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001f40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000004440)={r1, "0e3245996d26a0cc1ad78b53a13ac034"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000005c0)=ANY=[@ANYRES32, @ANYBLOB="00d5dbbb9f49e8046bb577dcc2d8d15fe1eb00800080d64cab0a81396fe2486d86e0a825c4dc73911bc90510a148c8a1c93119b9f1c202f0698b4a636693f2568fdb1f8b3ba2a479ea5bffb01e3af97f1f31c5176c7560c209c3840ace06d9dd29a0439e64321e70e42bc4006188dbfb4e6b751dd4180b741fc89e46e5620d95828fd723c1f60dedfd286facd8a370", @ANYRESDEC=r1, @ANYBLOB]) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000001c0)={0x18, 0x5, {0x7, @usage=0x4a0c, 0x0, 0x80000001, 0x5, 0xb04, 0xe04, 0x8, 0x28, @struct={0x3f, 0xfff}, 0x8, 0x10001, [0x6, 0x100000000000000, 0x3, 0x8, 0x3, 0x8]}, {0x7, @struct={0x1, 0x2}, 0x0, 0xfffffffffffffff9, 0x7ff, 0x80000000, 0x4, 0x8000, 0x2, @struct={0x6, 0x40}, 0x8, 0x6, [0x2, 0xfffffffffffffff9, 0x3, 0x8, 0x100, 0x58]}, {0x0, @struct={0xfffffffc, 0xe000}, r1, 0x10001, 0x4010000, 0x8, 0x101, 0x7ff, 0x10, @struct={0xffffffff, 0x200}, 0x6, 0x1000, [0x7fff, 0x0, 0x10000, 0x9, 0x7, 0x5]}, {0x79, 0x6, 0x9}}) lseek(r0, 0x0, 0x1) 14:46:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)={0x5, 0x0, 0x4, 0x0, 0x0, [{{}, 0x7f}, {{r0}, 0x1}, {{}, 0x3}, {{r1}, 0x5}]}) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) 14:46:29 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xe00, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 467.736951] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 467.762418] FAULT_INJECTION: forcing a failure. [ 467.762418] name failslab, interval 1, probability 0, space 0, times 0 [ 467.822649] CPU: 1 PID: 18409 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 467.830575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.839942] Call Trace: [ 467.842546] dump_stack+0x1fc/0x2fe [ 467.846197] should_fail.cold+0xa/0x14 [ 467.850098] ? setup_fault_attr+0x200/0x200 [ 467.854430] ? lock_acquire+0x170/0x3c0 [ 467.858426] __should_failslab+0x115/0x180 [ 467.862670] should_failslab+0x5/0xf [ 467.866394] __kmalloc_track_caller+0x2a6/0x3c0 [ 467.871067] ? strndup_user+0x70/0x120 [ 467.874963] memdup_user+0x22/0xb0 [ 467.878520] strndup_user+0x70/0x120 [ 467.882247] ksys_mount+0x34/0x130 [ 467.885798] __x64_sys_mount+0xba/0x150 [ 467.889782] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 467.894372] do_syscall_64+0xf9/0x620 [ 467.898180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.903372] RIP: 0033:0x46090a 14:46:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x40000) 14:46:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf00, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x5303, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 467.906566] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 467.926433] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 467.934152] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 467.941607] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 467.948885] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 467.956161] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 467.963438] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0xffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000080)={0x0, 0x9, 0x2, 0x3ff}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) rt_tgsigqueueinfo(r1, r0, 0x36, &(0x7f0000000000)={0x1e, 0x0, 0x88c}) ptrace$cont(0x18, r0, 0x0, 0x0) [ 468.060858] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 14:46:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x6000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x800000000000000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x18000, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0x9, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='\x00', &(0x7f0000000040)='bpf\x00', 0x11040c2, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x401}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x81}}, {@mode={'mode'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!/'}}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio='permit_directio'}]}) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r1, 0x4147, 0x0) lseek(r0, 0x0, 0x1) 14:46:31 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000003980)={@private2}, &(0x7f0000007940)=0x14) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000075c0)=[{&(0x7f0000000000)={0x27, 0x1, 0x1, 0x2, 0x80, 0x8, "2f4b271ca8f278b523b9fb20535fd2da57dac1316239f81f01d0e9bb722cedf23d23e51ed6c191322f929978afc31275aef60b31665a26799f12aef82d8287", 0x19}, 0x60, &(0x7f0000001480)=[{&(0x7f0000000100)="76875e915322a415f19556dd175420cfa9e3d0bfadfb0932b17aae050a94473275cf46dac629d57ca00cc652e4283e0c9d34fe9a938adb79923650567b680d51c0bdada60c2380396ae145305ee18c36de59004b9b8311feed5aaf38a81f196c599363592111595635e4098e492086c291c396ccf27491d87fae0a932506f0ece40edbe551873e7302304bee923524a2e1d4d59bdbd4ee85b442b400100522b795f3904f46d5aafd7a82bc2edd769136a6fb4c1e5dd98825", 0xb8}, {&(0x7f00000001c0)="29d8667d62118eb2a43fd61757bcf394e239a2eb94c6c7c6088623bc308bbaf1b85de2c362b2a263f6d5431e83acdf79f691ab3dba6953da69e4c2c8c3c7271e77aa2273c2f1be48ad4cb8a5e29d791b5b2057a6e164023f72e287188936e5073a036fab6c57ee913f4b5c9fd99f9b37f4f6fb638f3aa4af1227dd13806c2b24ba26bdcc95c610037ceb2052c5286e4a780e122a47e554e763131b7958ea21ae9e7a9f67468a2b31819243a1720bfcc3c8aa538acc12eba434ca78922638c62cf9e84867e3236f4d9918ead36eb3357f95122827a61a85dea2c24c80dc47bf5aa39c450670dae0d21f57", 0xea}, {&(0x7f0000000080)="9ac3fb3f5643b7053becb7ab78973d9439bb1aa20ed4a091", 0x18}, {&(0x7f00000002c0)="6cacb12d01fae92224679497ea62651c5dbe9073045578ea57127103800addaef140f3dc329012f5a00abb73ed09adfb2e4d87bebce47368dd", 0x39}, {&(0x7f0000000480)="7aadb27097642a62e66970e31d1ca467ec6e9bda77f973d54ed5162e3e141b77f94136dd974ca3b87bc32f04080aec2a1e9844e1ce63317b769b30ce6786907313534d195d08320f7ada92a4c4cdd5b6f9184e985df56d119f65aac33fa8fecba1ce44e63b86b7306aee40fec5f29b6e112a5beadf7d9b7553edba02ce5df285ff9b58c56a5da0f43333ff191122265405172109e123f36365a5048cfafd207ae864c72beac54386ebbd8df0b884287be5c9db2b6da368a57d7349fca35f70b011999e45d9bdd2ed7379424964c29596315559cf2be03d8aacaf057c472b58817bf83d4a6de5fc047634a1667d8c3713e554df7889c62e799075451205a62c7309e199fd4103f884393fa0a2455315735b75f9d0cd70ed50f28c549abb839a06797a21401a4e10ca92426af867e1ffb03ec1073f63bb09d34435b5e861eace4fddc0fb3bb71182b4285514265f13c34bdd672db6fd20d1f6d7a2f80a4fe74098a8b760fce5169b50ae198105e4974ee02fa40eb6c8c29f41674ff57b01359e08c500bc9a363b1d7414ee25aef9c9c182c0a34b6bed487120615e58ba3fceeebc1b151b9ef40175b98cd4f07c9a0d2767603d4c2b3f063f9b700c6b2b6b57ec6f0611fb5dbeb045dab1793712a7f7ea3cc2fd3dd2105150f8263aa63b32ac2a78b9a0a3f3e715b4ac3de22f9a8f7053ff9b00d6e00db966d94c368f4502c293a8eec627ffcf3155461354708569485e32aff5984576d9418cbdf45a43b01af3a7365daf657d7f9eee4bdbaf79024f1b8468de967effabc115200a2cc10bd9e580bb1b70f97f57973b64562a56f21c5ebc588bbb2a893ed03e989bbdf2aa9bc73ef88fd7c41b2882b86047851626f34e2c064492d8f559ebe925c548c019000f48216581a5036c7a1a059653fe86ee60bca00ae18bfe67b6931045bc8c348a3dd5d50dbda9732057ecfbf3031c871585e8d469ae78936213151f37982f2599d8c935a42387b1f737a989b10a311e07c6fe9a61fbdada592698c86b7c056f997de9d71ac3a830b046832c2553b75e58012f8fdbaa8416db791a51416f2a98afeb3c63632cc1a550405197d92647c92b3e7871caf194a337d6d2ba5d5014e4d9f86fcb4d3b720248c7b505003ebe0646b025fc902cda46ba0a4b9e5057f6a55ad1967da6290364fcaf3849c170a94d42edcad59b93f9bfadd028b0a96830fd1f90689ef288fd2e81c30a7e393d0345bf0e22b3f260a53508787544b5e2409ac0fac7a72884ad2605237d2b8fbdafa119b14d0a29a5e5610c40be4fbb7eb4e9543d3e7d9c45989d801cdee9256b1b9ff8d51a3c02c4bac945172e8ef3fe5203c8ad2d9f3565938f2fb2c12ea03c7cc7747a086d445aeb4950399ff97f2c0c67bc0f8cff56fb3216f7ce3a86ed1976cf301b3d8d2285b0f0a1d0a7e284df93864c151c44aa799f868c9505ee41be0a38c0164b79af8f6bc7e4ecb05d0305929fb69a44896d28af45e812884cf16ff70cce15ba6d09204bc35241edefab3c706b30be6ac6a08314f0fb67472ecdebe667f95a6d97548737bdcad5fb6ed806726ce0eadc91fc9a622b15f4e47d212ed1785b513f5d3737fed6700d81ffd87dee1d386645806358dd25d4f7c350f32fe490b54563a63da78358e81a43875850c889879a6c687a22243cf948a4147a1171d1481196c938c6ced76ebfb57aa71715b76736cdaa14c7dfe24cfd7776140a244651f5b371320d5bec7a18d7877660567cd6bd9b6eefea5d58c36a3f354c7eb2fbc778af96e0e2fa9acc8bde80437a4e000c06f14a4accf9d1488dcb9be6a067a80b35e986f3230d0299a2b43c8671e4a410894cef9c374063ff8e76626834239966b434a5854803096b81daf3c9f6df9189b8edd530b150fb0ad66d1342629ac96c5f4e4670249aef6915b9899df783965235bed1c3152c88fd1b6dd49420d09daa595ca682913d9a02e8ae42cd3613ab71ca1d8d98a93a479e2513813d968334ce5d63d5ac3d9e982f209514a8ead43f624cc309cf400b8007206405f8019e0b76526f07fb74e2d10d22f94e7daa0f9062b0af885236f54f9b783defb7aa5cd5c58aeac00abafde85bc1422d5855a4e540199cdcf6df336010f84467442602702e23c7c413d44b6a9881bafab40167073805f54cdb797f7ab6ab7403eb5f1946d62642f30f05953ee8761cbf9938a32f5538d51eec86b23cb45ad054790338581e19f7904a8880919c9e87f68e749cdfa8f2b38ba1b85efad7a608c80d3fc610adc646105be1a2f2ccb1b9f1f3d5e9e7de89a4f8bf10aa26846f04fb48a82f43ac9dae6e602fdd1174ae7870d927c08638eee3cacf32d626ac8a359fb2c542e2c12c3826ade36c8d888b14bebdae01b3f239230358c02e9aff774e62ff8f51cd99cfe3179106fed556038e3d0b6b6e7ff652e36ba25e9ff7c5f29f1b7c4f236ae1a20de6c0500d655d1c77156ca6c8943c0a0a4d18e8dfd1df1e12365c3de55a2ba3bfd9837a381c7b54809cb70daf8a0a9a8b42e7371044b23c96350c26d3af18cfcf2e12a951ed396c261c1b0116807ca4d156bbefe8e23c60ed31c9be7ff52509aa072b47732d558ce147b5d0800f16ba87e67aa7e043fcdbd4d474417063585888946d9b522b86b6264b425c40d2169e1191dc54b2ea7f984c9f915a7ef41cc810981ccc1243c938ac8b6d2d4c40ccf98d4ba5a192dca0eb10e1a5fdc0263b6d946912d23c42a8877dfe969157cb9baf0268d8fedf7764f69f572158776e13407f9428f2b098b0b900ec5a8325a40358a0a72cbd8efcf1c3d8235ddc0918d853f966fce0f8a1df73346d5190fa9535fe2fa68ffb98ab8b709eb5acefda96f19fe0b78bb7800ef27533ba20317c47a6eead8f1a8efa3f3cdf59789e561925dc79a187b7c9081d66ac8a13e01bb63660c858216408f8ec66775bdec777d7dc0b6664db10b8d743a37e8e46866ea3bf0fc1e5a0e75fa8842699f3266eb840ae32de7f9abac61278c5b7d589d6db48a8694ea4630eed1509d7fbba12ab5ba216f95992209672939b619c57e6d8358ad32cf1e7fc1fce08c79e9a8d258fa6866a59c389d7d325322f7b27e19f5641dc6919eff8352170cd13e9b04f8b3e5ca20592e1bf5d497af0ab281de7922d0a3f56f7b8393ea5d2193407b4b449948ac6d241b1c600d60acf03aa6933b24b1d624107bb1dc899d306a52c1513e6329472bcc26d25dd8afc882036a02f5b63aea3cdd015a33877b951808540d8334972ff16178a053e9519645043cb1c65e40cd50f78c0e443e657c1ce1005c70762048598d86dae1972726d5608de8cc8848f0b13e715b47cc3f08ab762b5b4ea836cc8cf63ce9b681a1f7b23d8a636ab341e424a49be2066d2ca0ac4b55bece2afa98b6178387db70d5fdb4f75fd17d514c2dc1fbacaaf4d0f7e54d0fc4ecd21a4572bafdcd6f9124492fc5e5480e143f60fb59c25e1aa047eb4692f0a4ffc55e0c6a435c1a18366d0749b53ca10fc91e77e2fb9a4a3729cb2fc65704375bc79ecabff5c1f0750550bb816e26db4402176e1ca93cbcefc6ca269e770eebb4bd8af0b449eae9b242f9ad516af2daa13a9788a600d6bc4d5fddb6973ec17d6f751b4db1cb60e4fa9cb2b28520139862d32b66f17026fb83132fc241555131bef7a41ed25ae627126e123def9a141447318985c99ba9707143e140a1df8c6a79339b85f26fdb2c7cc3f3343fe7c2c9570d51b00b46fbd115db6f6145fb703321fd5024d441fc4ea46d830dbe87170406eccfd66dfeb29d159e1bf064c41c6d1dbde4ceb9fe7861fa6c006e7c2f84e8a95549048173a71c176e172ec1622f747a750fb36bee87aa47c64ca912c2ee6e0d8d231296e0e8366059253e67d724e8423a7ed8a95281236c4090e4597c60c9b5b95ae777f2c4d06046f24147fb57cfbdacfc7fc4c245755a6d092d5986298cf5ba1198c745d8da7d0469f67e9ff5f7c3552061b8ff2ef2a211e78cb159c0afe68255cf332136f478e4f9e455d5ab6edd0c2bc7d4159b335b8083ccc27c0bf46cd3a98a42e2c697f3abfb42a8425b6542ba5ad0a185c28bce49e3b9d2b5498f603f7e75b2cf613550044f985c484bd04c8b9481b16cbf9c34ff3d05a64a283209703e2d75cbcdfa92e2c2ff1a9f9773847d0d183feb759d8eacb542d5c541f53995f6d58fe86fd3a9b69b0909e24ad037518c059177a080c299100ed10efc92ef3db6e3d8107a69b0a4e2fd556e289d3c2877cbc8ae746001d12f12e36f370655a3769caa94ff3c184d48863159414dabdffecda265b02471948022072d3365e3ed0de7c99710601592584fb04a3b194253b67bec136ff110da1ba3bbbb3105b0e1dd035d4349662c7d41add3c5812c77755d15b4f511bbf9d9907b527cb0ef60e46a387100d27b0a25b71243c157b0a1f7c46dd42ddc88eafd495cbd9b1cfc9fea4300d188320fdbabf08af8a422a9047b7d303123a46bd202c6c4b86fd0aeb377f295f1d86832bf64c17e5b078be729bd9f00785bf2e058a520b2892ea3dea51df2d6b3e96bf6d17fed6712523fcb28d51bf9456b04ec979cfadaf0ccbb91dd9911974c8d58b66c31fa560a51421e803f528b25c46f2ed733a291747c622f8a0c0ee5ba8b3b8a0e2dc193d6ffdc44b43a62209b22f6e99828bbb4a5b641ea92e4d480314971c79288b3519436a1bddae39069d641315826524b6b12aeb838a675665d6cc459c04a3618738ae09383303fba7655de66b5b6bd51ab2a348f46d5c26cc50879d581f2fc2ad866aa4c6e8c5d643f0ab6862ce8034300a86d4e5d7ab3808ba3acf8598d44e3c7ecb392e051b04bfc00008ae421c338b1d4c944092b6a4aa05178182d40cbf71caa53ceadbadf4fc6ab8d0bb3c3433193ea66fbf8bad337e1f34ef3e68c53f7d8f4e483f6990feea45c76652a30c529b01c5be19ffaa74adeb8b69064f0d73547133cad082d721ac3040c299db59937a0a032935b9ebe5cc856f3bef2119a22bd210beff69c87143ec13018ca26c360975928f515eabb1ff2090af690a02331b5a6e086893c2eea65f7e1da4460b297946080c980eb81d7788a40bae20d194fa0c93b4be4612e313efbd1345ba179490be2b1e6e926b6dc650b550a8f02ff4393046b823b16d4900f3ab8ae4716732e2205aa00305b9a352dc61b269bcf3053035ad38690a1212f7caf139e093398f8af732db953c22ec3993f4976a76163710c8755e5bb8e88700fa573241206d13749895b432f921517b0d77e0815e97a6575554217ade08f310c0fdfc7eed3d5b0a57411e123d0ec00c03c9e8640d6314022543f04f61b67d78bf26d126277b7abeda6f3eb507010081c9b6c3ee8f2771782b83c19bd093dcec52449d417a7324cbbebd4ea85049f5dc8283d36fa3a142a82f988e42deb06a4655d1de79e3d9b0e2282528264125dc636f3509836766b0891e5a2af49b03e1d0d4ce96f8215afaac41d3b5ac5f07003fbba376b3289630d200bbf06ab2398d76798024e92a7bea3f9494656251feb54d158ac8040cfd9d4b268a767eb23fc041b7f07734cfe1a9b65b2031c2d06078e8c30f8e3e83f4c1c738016a0f9838ca52967a5ff2d64c31eab41169cbb8dfb4d88898af5271e21b9ade3d5b9df7cf65412775daae0293c8b0dd2a39f9251711ae4b908295533c79d9d6916f232e41cd810d0b782a8140ef324eba8483050661828f41a9a532e6ec446417591962fbfe6b3a9a720022c240af1e9a424d490411fc2142830507ba", 0x1000}, {&(0x7f0000000300)="06fcb8394e343ba4e8d5777cf63d446eeeb28dec525d56d1bfd8", 0x1a}, {&(0x7f0000000340)="2d2216f2f6abfe63d10ca331cee5ddfae0bb8c4790e4e080d0663f0fbdb811c486cdbdffd21f75d04bed53bd2f19205fa0a5648f0c4f156438ae0628ea2eec5e9645ad9dfdf92540a415cb322f0e0f3576e35432228436", 0x57}], 0x7}, {&(0x7f0000001500)={0x27, 0x1, 0x1, 0x5, 0x81, 0xa2, "ca8561316c341a3901e0a884127c20baa3c53bf57f4061569b2242a3d9df96a107c4fd5e1694440c380fdb9f857116cfe2c7710bb126ab461a7a6175a476ee", 0x25}, 0x60, &(0x7f00000003c0)=[{&(0x7f0000001580)="c282c913465a85d9184a533bb4770be31b1bd098c8199603401421553c14d1f91dc0714262c549f538193ac6f95b37058c4de3db90f963885e3d144469cb1d7ca2e6ffaa0215089154a8fdadffe59ac267205d0d4e730b3e4ee36077bd6d23abdc51382c3690458b0ca822696aadcd70262cd3ba6207d03ef3d1eaff80aa8e80e5a2ce089d41bf6bd6c43e1e01a3134ad5b69674c0bf953e7f26bd88189f8b177cbbc0f200111c8800bc3e7fd5f22f0b1c8a7ddf86ea843be3c12236077d779b2cd14dcb0d0a19f696cf8519ef4ef5334c17891d57eeebc66b", 0xd9}], 0x1, &(0x7f0000001680)={0x60, 0x111, 0x2, "be1f1e8fd864a58421d2ea2dc3f50a91aa007376c0bfe4106d11dbd5974c3b72a305c81178ce1d20658ef48914f4ac2fe039c235b54123a1f69e81bdca1d646079f7c13d3a3a3966ea5f62"}, 0x60, 0x4000}, {&(0x7f0000001700)={0x27, 0x1, 0x0, 0x4, 0x81, 0x9, "96467a20eb6e0bf9ab6b1f35356743204efe92a6819b2c6488b98e662ee259f21debaa4b88c4e1719da651b6469da8c9f8a775bff181bd3d5dd67b4d581429", 0x32}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000001780)="474519ba9391557c4cdccf6307", 0xd}, {&(0x7f00000017c0)="de9ad534cd8578cece1c5a1f310ecbc245ec3a35abdd802c4f144732d7876fb683a0855bbeab6252b7b7f38ff4c6bd041927625b27bf933b431de8f034c1575fc29dd1b113135300082efd08ad1819ebc7a93f76190e8f109c57e3733ac5e32b75f9fe25b917c0d4d471fd2cb2cffdc8eaa171a9ce97716bd5b803970cdd46", 0x7f}, {&(0x7f0000001840)="60546c25285ed70d5581467248418ae4d39282f6752e474c0111a162f7f6f00db96df88774826af4334a4dd02101c51de1f05c5f401b20926a3fa9bf70b74e3a5005000c3ae402d3bba2f169795ab3ab26a025bcb766e1e365c28bdbccd5acdd03297839c25b2fd4fc05c527087a531e3358be2b3a3f51", 0x77}, {&(0x7f00000018c0)="2ec2868ad0ae6676c7e20461ba9ac02fdac5ab7d2bbbec0d600416bd5adac47d889cbc99326c190ef00ee4506a43e532325731fe36694253635bec21bd8e7b31aef569d14fefddf8d0e87f287ac244a6794c61e2763f5991a314246f8908ea", 0x5f}, {&(0x7f0000001940)="0b48f7e434bd559ff8144c801906aa42435ac6a1cb4bf0c621daca6a418346a11ef2fb37b9fbc725865d3140b5f53823ba2016b48510ccb7e3477c67e6b926ca941b2cb8a8c99d13a075a1bd0dc0f5b2cf09d2c6a506a86b2a794b7c6d01676d36aff64e31d59c8b3f79de5648ac624ab60f380c046e6a618531a63f0df6dc5753d9", 0x82}, {&(0x7f0000001a00)="3b4ee2f85341463eac3f205635182b94d24c43fc0a783cb53f206b1363d87a664c3e5472b55f3c1a6559d92da6bf0516a99615e097073c36ed94637e39e3599d46007eefc109e29fa6ee26420d4f7909c1d8e8b55a105cc4a3708f2ead4c", 0x5e}, {&(0x7f0000001a80)="789a1b44d31e0f3ed39e03b01768a971892564cb0549254ce4d3cc407d4b7327171ce3f38ce4281b4b53455035321adf9bd5cb482993b2f08d1af8c6fb4cfd89f75219d991bdfa354903a5381a5e92e1bb5b61c97b1a31e9b790827dbee76599231fb8ec767a6f94d23fb65b", 0x6c}, {&(0x7f0000001b00)="c2d72d233dcd85314786d8dd4502d0ec5f1e693ffeeb48a91fd16536205167f8006d0ef71532e1ed558aa82e4f87", 0x2e}], 0x8, &(0x7f0000001bc0)={0x80, 0x115, 0x8, "2599debe90c3e032c31040a04257e00f36164743d2988d59c1c667ffac870310416dd981ba6ac2ac7f709348ca7bc325c9917be1100b16b5d0fae26ac3df27560dbd32e50af9c302b8e5d0a46ea52b81bbfbefea53a282fb9a44e42f0c628aca790982cc7fe73b98b3"}, 0x80, 0x8800}, {&(0x7f0000001c40)={0x27, 0x1, 0x1, 0x3, 0x7, 0x1f, "0bee8026368c0fc6e448bf182f303ea061e5e474d6670ceea82bb3d5f527f75662c93a84db8bc0c0aa361873f9bc177909ae488f41f561b6f716dd88ad40fa", 0x3}, 0x60, &(0x7f0000002100)=[{&(0x7f0000001cc0)="a4e6cd1cdd2540430a692ccbefc0ef5732570a63bf26f36c2855e8d7257844c844030da92c2877da3cc426b5e71dfd40c59666", 0x33}, {&(0x7f0000001d00)="d239b2fead034d92de3fe90de8d941f8833a11e36cadee7046f16328b28f074eebf84fe99076de0edbd9c988e67f75783a02a02278b9bb7faae77a63444548a5fa0b2617e31be44bd8f0141a7f25efc5f7a5bd21e54c83f5dedde2fc33cc26900a6839a90a94d7172d00e8d97526758634268e5b9cb30d6390c9345199b059521befe41f6ef750d7fb143cf1c60f18f4a3da369350b23674776d64bfadab18fb002848f5774ac2462e63ec5dd069e0882e058a24b10ca47d0259f044303f9026913b1b251d7d024b5c2ebddf5adac5592d186b0370d719f583902ff0e45713303f19d4c7636115f366277290eaeb1e1b87bce7", 0xf3}, {&(0x7f0000001e00)="8fb5fac2862b69a7cc4ce06450b634ba8727d4590532c428308f171007382ff58926702342baf947f8aa3882265a8d8c7e53a76743cb20b3fc1645002b31d7e600863c2b6062e85713083798429be3cc22e01888a50b2725770cb53aab696fc32a1a621f34e7b30c7fb08c5ea469a8e85dc562b75e9d67f578a5019db00324cdb9a1a8a9e2f9e58cdb46801791523ac40a1b21c3af3e4b5cb31138ec9352c599790bd3eaff8f93490ab338880a43f5db7daf7ef939e4a7e943ccd56d187774b54b1c6f02c36a3c41bc6f0f4e6b509db11d", 0xd1}, {&(0x7f0000001f00)="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", 0xfa}, {&(0x7f0000002000)="781d57dc3990b2c8f1959ea90804aa14aefe024bee0cf75886ade4ef7763d7a5301e74c5b11b385a6b20b6f8f52d00c9974772726d18a9413d20ed0cf82c7852bb2cb6b91ed3c8d6e45e2987fab4a8af0b011938afdd3599e750f747762f6f772d926c61f4da21a1b8193d8b3fc5dd0103e38805ef66ea06ac52c2094eb43b71b4951d6aaa394cfb60ad6ab1dde597b25807d6ab9815d9615fef332b9123d8f1be782710e3349517305b4da0684ef5e2c62d9c062664b99f3d8512f8d09d95eb000bfa9100c42a848965c9815e", 0xcd}], 0x5, &(0x7f0000002180)={0xa0, 0x1, 0x40, "bc1dd62ed75c3da7a74d19fb9fb7e8c8c7723998c4477031cfb88b35339a60fd5f52d7ed3e3313eafe5d6229727aece5133bf0c4ec7621ff51c1c56cf9480826f0e4cc0ec53571ad41964bbf0990734037b411dde3791b1d0459fa25eb92f42af9edd0aab04890805619565c7516aa386480ad7795c2beef20f5609037e532c97a24abd2dc7d055575d6b448"}, 0xa0}, {&(0x7f0000002240)={0x27, 0x1, 0x0, 0x2, 0x8, 0xe6, "e2abc2d3a4c05a41043a10e38751f7efa59bc3f611b40fed3fdb4c8675500b6aee3d8148e698bef43da14012276c2cbe96e9b82a3b6473cd483cdb38acddfd", 0x7}, 0x60, &(0x7f0000003540)=[{&(0x7f00000022c0)="daca47c0e09d1a06f7bcdc8a5b85c1d998ee49e12f9e1646b00cf40de7c04ef83a5cb30bd63246e5202121332f90a21f939d4d90ad90381f38a30f76e93090f5f9f3fc2bcba78e10ca73268d3ecc5967e853c7c91dca83426a4230fcda10c4c8d197a1c5294d6d26ef76b7a55ef62ee061209cb9dc092745889d198966a1063da987ed07e6d0aaaa26c05b6fcb7befb21a9a28b1a728", 0x96}, {&(0x7f0000002380)="dcd27ecec080da7f504481ce0ccfa17ea5d2c7a6eb959723c72f92b9b40e87d715b4e4565e7cfd8228110f4076e00398ceccd038adfd31f0c9025a19ced303c54af0c55cbef941f585365285a5523f34c8bf15083522d00da106018ecd77b0264469004274d12cc5e02712c7037d43508abf1a5bbe9f98b44474810ddcfec770a999c121", 0x84}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="75d4cd23bd06162c1e9e960c431b1eec76183b59281b127c2d2828c8313966865867e60ae22172e42e0cc4684d18e48a8fd63fe3a1afa8451a4d9ee0de50074a76a64aadffeb96f3b7337fc6fc5f5caf4e89b0f99e7bec876b4754107363c8c8869dcf7ed62a71055c6f68c23d7937993696e74fb2f36ead6de7347c83b52fe13721355733b8a64686fb0c6803ad00ab15faa773cfb5dda4583ba37ed414bdd67b8a425a7eea965ec183a5ef8802927e0d397264a85af65cc8e7e7664a0906143d1765131707ada235344553", 0xcc}], 0x4, &(0x7f0000003580)={0xf8, 0x114, 0x77, "04a41a656593ff245cee41c2950fb716b1de10e7ec007b30038adfadbba203ce2e0d549d07aff09d26fffec7ea32e6fffc9001507e37cbae9a2af58f46715051a103e66b2f1301da13c946cdd3d2cd58dcec8cfa6c0e199c9f36f1b250ef5d2689879da5445e86062c6c6b7f327a370129ef6df6883b25ad7b56aeadecc414c8b23a4dd4fe2ad614bd904a959194ba3168b2319af8303de345c77cb9c40cdcf21d4f128498269d5ccdb658628399877f3b2534f344bfe5c2d2f377414055272a98644f0aedeabd0252e450b481e7447a77a70d097bfa14ce650bc1c09edc2d40cb00b4d26b3542"}, 0xf8, 0x80}, {&(0x7f0000003680)={0x27, 0x0, 0x2, 0x4, 0x0, 0x2, "fc2aa56491a06359e18fd8277018fba0b64b8a951da2c5510f1a4c61996004442f19a1930e21fc4473821f3dc3cdfee7e706bdae777ba2a218dd54fa7d4477", 0x11}, 0x60, &(0x7f0000003900)=[{&(0x7f0000003700)="394161aa7e7b2700ff3e315647bc96e559e2f377dd530ef5682f8cd142297ffe56baa80e416a51c3ccbe10b9c2fd0ff2d1395cc4da0a62aad5f5566cc1744212", 0x40}, {&(0x7f0000003740)="5d11bebde3fa99eb9821519823ee27e9ee9ef319a05a6a67f70e28fddc3f6e6501a89ee7256019763b3dba66306fd1de0e35f789a6f094c3acba3c736efbf15f3d3bed2f998aea0ad5d20197e44c3b3632c5fb4b9602097aeb6ba1cc2a032fe29894d68195c84613b583cb2e1d1b7755af04a2d8921bf7a4f54df29b9b60b54d28a083e00810747716b80a626acb96e536150d0e3a0c2ac7e48e2786d4fd095f3b8be1887a746b054a88c0", 0xab}, {&(0x7f0000003800)="e40594893cf2f3cb2a6891062341f34cc43625c19d4e808f1f47f19a7bed4c2e7b04f6b93591d9df0f251d57c3ed9a70398fae1ae1223d02bccd938132c6a6fd55819241286a4d53ce0f8ef08eacaa1dc7c9a3362a5c03adbb61857fc34e55dbb4b37e30df1799cf869358a63aed375ae0d939defb19a328f710ac55952f2949aaee977bdf9f1014cd10fe766368e1861e7ecbd249c03be13e69c1d6915131fe4687f0d1f61e974bbc8403050fe5ddacc9f5fb3fa1ed68e5158d131208fd99e05c9166321b56bcbafc395875688d001093b895052ccd", 0xd6}], 0x3, &(0x7f00000077c0)=ANY=[@ANYBLOB="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"], 0x80}, {&(0x7f00000039c0)={0x27, 0x0, 0x2, 0x1, 0x80, 0x81, "32fa58df16d700dddb153c2047194d58b78decf082d2b4c952d5d59385e4f1b93002cca26ccf2586d3fc86553a1be3e258d635f3953138aa2a3618a3bf17a9", 0x3f}, 0x60, &(0x7f0000003c40)=[{&(0x7f0000003a40)="9e33d40595b893ef584248d34d0c9c3c0fe53d08455e3a051941b6d631387712db98fdd1efa1ed8d8fd3bd05ba16bcce5479f0dfdfeda5bb3e7e8942baf250f5a9b12603adbe1c7f5eda50e3b6ad67d4e6fadf32", 0x54}, {&(0x7f0000003ac0)="9f5581f691ecb18f65858da0f2958fa6c44aa10bde8eb61a38ce9470ded8c061e4ab2e3e645b00bae12c2cb79c2d06475c8f8a605e6615ad67f08e5957fdf0f489d82864af3f91b910e962cc77aa79c6c543e26b105887ec1024de58b55763e66e5832a5812d2c5d583bbc32039b3318688b31be25fc1e349e02d69180a9fc7299af29f3", 0x84}, {&(0x7f0000003b80)="4a859c7c91db6684fa596d1af53adeb37762a8307202e58719833239a15092be2aed846e7e74cb28d478c627a99fc58efae041d58eb4dfcf968e08fb6a40e3f962316b392ee8f6", 0x47}, {&(0x7f0000003c00)="a5295684e62fafda7bbd1f1b50ba74374dcbb4fc6e7ced4d1f", 0x19}], 0x4, 0x0, 0x0, 0x20000000}, {&(0x7f0000003c80)={0x27, 0x1, 0x0, 0x1, 0xfd, 0x3, "f3859d33ab2b95d292bb9776e02096262cbc142048a7cf46e204de5ce24e1187bbf4a344f3b1198baa69c5215a99307e43f2518048c6c5e0b723015fbbd9e8"}, 0x60, &(0x7f0000005f40)=[{&(0x7f0000003d00)="bae6214c69f076b92e0c9d48158f8304f61f4441040235ebb568bbbfd0f0443c88edfa517547e9514c1f88f3633a6ff0fa0a7b2f217618eed5e9f9530beb20cb97626d9951b026b691cb99941edc136f0c9af10c06bbd3fd222c58dcffa97ca0a3370189efdb0c965c827f8bce1e0936ce38c5f11d1fa126dfa6bb11f97b0bba2b352fb5d903fea990a92be2fceda699b205f0de9d21dbff7f4c75f30700", 0x9e}, {&(0x7f0000003dc0)="9694ae8cf3a78b9756ffb59a0d720d05cf54", 0x12}, {&(0x7f0000003e00)="9afe120ae2ace86d2b42570290f0578dd599b924a650c0528d9ceeea9f1d9bf3", 0x20}, {&(0x7f0000003e40)="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", 0x1000}, {&(0x7f0000004e40)="cc2f770777c1210b513910d1cec016f53cd3adb8792ab274cd986116d5", 0x1d}, {&(0x7f0000004e80)="5fc4d50fa6e67c85d1ecd3770bfcb91efa24dcf2db0b560ba0a90203bab91582269c7ad9d8b8fdaa8e59111aee5910150342be873baa23736a706d5cc32191eec0d1f12332105f4616ee22897aa216c86d4829c7a9d6b0d6faf61325c037181af430c2677d2b8db0313c3a26e117", 0x6e}, {&(0x7f0000004f00)="c0e3629f04d8229daae2965017ebc7fd28938d36433498cfe593c468b62e", 0x1e}, {&(0x7f0000004f40)="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", 0x1000}], 0x8, &(0x7f0000005fc0)={0xd0, 0x111, 0xedf6, "15969b9ed6320c3251aee13bd8f976cf5ff996a2e5b33d8d353a5ce2fad964aa8ac10a8a386758f4a7154b209eb3a3251060b1e06c6687eff65e5d848d3b4be3739cebe87b3e7b82ceecaa81852b7d84f2cca029fe0da20938767ea30d2a272c9db36951f4bba5da9ec53b96abc5fa99157197d2f9fc9d6ecf8076d862f715b52b3caa657cc921609c8bce4540ea2bfaff4bdca2f22f365dc2401893df94627746248ec890a15f70c7b3fe74253ce0591d299e4113a26becc3"}, 0xd0}, {&(0x7f00000060c0)={0x27, 0x1, 0x2, 0x0, 0x4, 0x87, "0bcd4ae57b7ff3faee9faa8a6aa499feaec13b0a2ff81c7f05ec892e62b04b33cd8b8eebcb6630393eeb1ec5a6854370aa23090f17f0a940c8a4febb3f9ecb", 0x4}, 0x60, &(0x7f0000007440)=[{&(0x7f0000006140)="e2c862a22b08955c934cccdafee4bba7104a89b33ca47c2d15677a", 0x1b}, {&(0x7f0000006180)="948438b2f60673b162a26b5a97178679d188b4026d0221338b198751911ca9289435ef1a060da7a484c95456013b84990c0c45cfb0498acb6bc6e7389ccda09c8da70c189212e5cccce23be69fe326b72c28307becd3ade6b99a09b8425cc251fba2974e0b4e49ad55171ada90c82efd3e52df28d95a401aa46b6ef25cd0953af20a37dc26e269a6f104b5a5ec10d4c047293f734e6525555653e206710cf9c32edb4d178cbf89042defda9081c4fc6b07939c5b4352d6bdd188bd5e08f06144ebbb2d45569adf7332d0cffdcbf2", 0xce}, {&(0x7f0000006280)="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", 0x1000}, {&(0x7f0000007280)="cf31e7f4f85478379312f49438e0b9136b2b712d9ad9716a7ab6718a6f19d1d4316e1dbf14a30480f3a299185ebf778e10d389b73dd3b025acae02773a8fabcc0deb1c180976847779031b9e009b42ff7eb7d920d7311b9f9ece0e9a28d93c8c502261bd42b838c1eafc40dfe18777e722e8123e487d0dc15344b5d0b12d0e3be3b4e10d089422979392b6b4182ae0f2106e7074ce458c9143b11fd3124acdf658f252e6055200b9afe9be5172", 0xad}, {&(0x7f0000007340)="da6e6a5348bcfcfcc0fc5707f6fc3e59c5e82fce26ef5d8e7263e2c9e6edcfce035ca7065584fbad39cd1b0de00fef711ee045463cdb3ba8e30675948282a34711803a28e8c25e9bed640a1463e1ff1e9d92f6cc2c3e46e1bcbdcea88788568e428ea8a1ddcdc766b1850c115817a452ad72279792c280201f949d9ee7d195c6f407a9823b799bb8272e190dc433cf6496507913512263a51435e36bfa9ab84265436585f71f184f576fa0822d38dd3c6c2b4ca5e1a625794496a62cf834c1db8d5a2cb1ab0f5fc183b9c674d0afc53c50de6553b69f689a7598713dfd7fd8a3bcfcbac4919d64921845ffefa7de1928570b6532", 0xf4}], 0x5, &(0x7f00000074c0)={0xe8, 0x10f, 0x8, "1c071f189fdf6a3a2473082e5e35ffe3c010b0904f13016c1abcffdf9f6c6b614d682f82b9c3597c82db76f79fc58427b532127a4250675b8d3bc56c793534ffad5e2fef97bdac777d14d9eac2d56b269188b839ebf7b7d6a0d47f44b7832bebb3a58fb9ba1c1e3eed28c793c6eadab3b27017bf70bfb3174fe2d7a831796d014568be1079f3a14845bab86cb3ab78f715809aeb7ddaef28df0fc423f28736df9b1fcc3d9d6f43c0c3072cee906d4788734d385eda6f57ac624c03d863e74b4967de59e67f53109f2fb6201546c908f24aaa"}, 0xe8, 0x20040040}], 0x9, 0x12) ptrace$setopts(0x4206, r0, 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r2 = dup2(r1, r1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000007980)={@in6={{0xa, 0x4e24, 0x400, @private2={0xfc, 0x2, [], 0x1}, 0x4}}, 0x0, 0x0, 0x34, 0x0, "59e50bbc47600b2d022bc92e87b16dcecfa0bd380222a6033576c927fcd51f0a8a55f6848b206c2ecb34fbba1ffd418f9f45e45757bccab5026b9ccd4b2c2bf5e548882cc55f82268552f41486ca618b"}, 0xd8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000003940)) 14:46:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 470.295112] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 470.333982] FAULT_INJECTION: forcing a failure. [ 470.333982] name failslab, interval 1, probability 0, space 0, times 0 [ 470.379933] CPU: 1 PID: 18473 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 470.387852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.397214] Call Trace: [ 470.399802] dump_stack+0x1fc/0x2fe [ 470.403422] should_fail.cold+0xa/0x14 [ 470.407306] ? setup_fault_attr+0x200/0x200 [ 470.411617] ? lock_acquire+0x170/0x3c0 [ 470.415585] __should_failslab+0x115/0x180 [ 470.419820] should_failslab+0x5/0xf [ 470.423517] __kmalloc_track_caller+0x2a6/0x3c0 [ 470.428188] ? strndup_user+0x70/0x120 [ 470.432069] memdup_user+0x22/0xb0 [ 470.435614] strndup_user+0x70/0x120 [ 470.439317] ksys_mount+0x34/0x130 [ 470.442855] __x64_sys_mount+0xba/0x150 [ 470.446829] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 470.451409] do_syscall_64+0xf9/0x620 [ 470.455200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.460387] RIP: 0033:0x46090a 14:46:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 470.463582] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 470.482483] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 470.490183] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 470.497445] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 470.505410] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 470.512663] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 470.519916] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x202040, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x13, 0xf4, @udp='udp:syz1\x00'}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40478ef30537d2ea) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x1405, 0x100, 0x70bd26, 0x25dfdbfd, "", [{{0x8, 0x1, 0x2}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8014}, 0x20030090) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) sendmsg$AUDIT_USER(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x8c, 0x3ed, 0x4, 0x70bd2b, 0x25dfdbff, "7b57d7ff906eaa229f39a25d60fcdc3cd4c0b59bd27d2afd47e10c9ec21466acdd44a6935f16af899185bc5af222d5c9c576cf252e8c3e1371e475f52d29c6dede204d476dd96b0d207a9d1df8bf066659fc3ae29c74ac210c3a9420567dafd93d12838f885e5c20733ed41ce0158e0d1ca4e5a68f2211f64e1a", ["", ""]}, 0x8c}, 0x1, 0x0, 0x0, 0x48001}, 0x40) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x1) 14:46:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x34000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:32 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 470.646209] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 470.750720] FAULT_INJECTION: forcing a failure. [ 470.750720] name failslab, interval 1, probability 0, space 0, times 0 [ 470.767073] CPU: 1 PID: 18507 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 470.775004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.784368] Call Trace: [ 470.786974] dump_stack+0x1fc/0x2fe [ 470.790624] should_fail.cold+0xa/0x14 [ 470.794529] ? setup_fault_attr+0x200/0x200 [ 470.798865] ? lock_acquire+0x170/0x3c0 [ 470.802865] __should_failslab+0x115/0x180 [ 470.807106] should_failslab+0x5/0xf [ 470.810804] kmem_cache_alloc_trace+0x284/0x380 [ 470.815453] ? _copy_from_user+0xd2/0x130 [ 470.819585] copy_mount_options+0x59/0x380 [ 470.824110] ksys_mount+0x9b/0x130 [ 470.827658] __x64_sys_mount+0xba/0x150 [ 470.832321] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 470.836918] do_syscall_64+0xf9/0x620 [ 470.840704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.845880] RIP: 0033:0x46090a [ 470.849060] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 470.868304] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 470.876004] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 470.883267] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 470.890532] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 470.897795] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 470.905045] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x400300, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:34 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000001c0)={{0x8, 0x5, 0x3f, 0x5, 'syz1\x00', 0x20}, 0x2, 0x100, 0x9, 0xffffffffffffffff, 0x8, 0x8, 'syz0\x00', &(0x7f0000000080)=['/I\x00', 'configfs\x00', 'configfs\x00', '@}\x00', '],/#w[):#}:\x00', 'configfs\x00', '*(*\\!.$\xe9\'+\xbb)\x00', 'configfs\x00'], 0x43, [], [0x6, 0x0, 0x8, 0x6]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) time(&(0x7f0000000000)) lseek(r1, 0x0, 0x1) 14:46:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:34 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf0ffff, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 473.333209] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 473.333773] FAULT_INJECTION: forcing a failure. [ 473.333773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.353642] CPU: 1 PID: 18520 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 473.361533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.370895] Call Trace: [ 473.373500] dump_stack+0x1fc/0x2fe [ 473.377149] should_fail.cold+0xa/0x14 [ 473.381048] ? setup_fault_attr+0x200/0x200 [ 473.385392] __alloc_pages_nodemask+0x239/0x2890 [ 473.390166] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 473.396064] ? is_bpf_text_address+0xd5/0x1b0 [ 473.400573] ? __lock_acquire+0x6de/0x3ff0 [ 473.404819] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 473.409651] ? is_bpf_text_address+0xfc/0x1b0 [ 473.414136] ? unwind_get_return_address+0x51/0x90 [ 473.419064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.424416] ? __save_stack_trace+0xaf/0x190 [ 473.428819] cache_grow_begin+0xa4/0x8a0 [ 473.432867] ? setup_fault_attr+0x200/0x200 [ 473.437172] ? lock_acquire+0x170/0x3c0 [ 473.441143] cache_alloc_refill+0x273/0x340 [ 473.445455] kmem_cache_alloc+0x346/0x370 [ 473.449591] getname_flags+0xce/0x590 [ 473.453391] user_path_at_empty+0x2a/0x50 [ 473.457529] do_mount+0x147/0x2f10 [ 473.461055] ? setup_fault_attr+0x200/0x200 [ 473.465362] ? lock_acquire+0x170/0x3c0 [ 473.469320] ? check_preemption_disabled+0x41/0x280 [ 473.474323] ? copy_mount_string+0x40/0x40 [ 473.478545] ? copy_mount_options+0x59/0x380 [ 473.482947] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 473.487948] ? kmem_cache_alloc_trace+0x323/0x380 [ 473.492790] ? copy_mount_options+0x26f/0x380 [ 473.497285] ksys_mount+0xcf/0x130 [ 473.500823] __x64_sys_mount+0xba/0x150 [ 473.504804] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 473.509372] do_syscall_64+0xf9/0x620 [ 473.513162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.518333] RIP: 0033:0x46090a [ 473.521511] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 473.540603] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 473.548310] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 473.555565] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 473.562832] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 473.570275] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 473.577551] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 473.595487] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x180, 0x1, 0x4, 0x4, 0x7, {0x77359400}, {0x5, 0x2, 0x58, 0xf9, 0x1f, 0x8, "a6e5f75f"}, 0xce4, 0x1, @planes=&(0x7f0000000000)={0xff, 0x2, @mem_offset=0x1, 0x1e}, 0x4, 0x0, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000100)='(!)!-.*[@\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x206000, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x400) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x14) lseek(r1, 0x0, 0x1) 14:46:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x1000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:35 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x2000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 473.783115] FAULT_INJECTION: forcing a failure. [ 473.783115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.795068] CPU: 1 PID: 18553 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 473.803217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.812579] Call Trace: [ 473.815189] dump_stack+0x1fc/0x2fe [ 473.818834] should_fail.cold+0xa/0x14 [ 473.822751] ? setup_fault_attr+0x200/0x200 [ 473.827104] __alloc_pages_nodemask+0x239/0x2890 [ 473.831913] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 473.837822] ? __lock_acquire+0x6de/0x3ff0 [ 473.842082] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 473.846937] ? __update_load_avg_se+0x5ec/0xa00 [ 473.851616] ? mark_held_locks+0xf0/0xf0 [ 473.855775] ? set_next_entity+0xb52/0x1dc0 [ 473.860104] ? check_preemption_disabled+0x41/0x280 [ 473.865138] ? finish_task_switch+0x146/0x780 [ 473.869653] cache_grow_begin+0xa4/0x8a0 [ 473.873721] ? setup_fault_attr+0x200/0x200 [ 473.878048] ? lock_acquire+0x170/0x3c0 [ 473.882029] cache_alloc_refill+0x273/0x340 [ 473.886359] kmem_cache_alloc+0x346/0x370 [ 473.890521] getname_flags+0xce/0x590 [ 473.894335] user_path_at_empty+0x2a/0x50 [ 473.898495] do_mount+0x147/0x2f10 [ 473.902052] ? copy_mount_string+0x40/0x40 [ 473.906296] ? copy_mount_options+0x1da/0x380 [ 473.910795] ? copy_mount_options+0x1ec/0x380 [ 473.915297] ? copy_mount_options+0x26f/0x380 [ 473.919802] ksys_mount+0xcf/0x130 [ 473.923355] __x64_sys_mount+0xba/0x150 [ 473.927351] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 473.932549] do_syscall_64+0xf9/0x620 [ 473.936354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.941541] RIP: 0033:0x46090a [ 473.944731] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 473.963635] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 473.971376] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 473.978686] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 473.985964] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 473.993242] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 474.000540] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 474.085688] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue [ 474.184212] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 14:46:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x3000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:46:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:37 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x4000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 476.410038] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 476.411483] FAULT_INJECTION: forcing a failure. [ 476.411483] name failslab, interval 1, probability 0, space 0, times 0 [ 476.434689] CPU: 0 PID: 18587 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 476.442600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.451967] Call Trace: [ 476.454578] dump_stack+0x1fc/0x2fe [ 476.458323] should_fail.cold+0xa/0x14 [ 476.462217] ? setup_fault_attr+0x200/0x200 [ 476.466521] ? lock_acquire+0x170/0x3c0 [ 476.470565] __should_failslab+0x115/0x180 [ 476.474795] should_failslab+0x5/0xf [ 476.478502] __kmalloc_track_caller+0x2a6/0x3c0 [ 476.483177] ? kstrdup_const+0x53/0x80 [ 476.487174] kstrdup+0x36/0x70 [ 476.490365] kstrdup_const+0x53/0x80 [ 476.494067] alloc_vfsmnt+0xb5/0x780 [ 476.497775] ? _raw_read_unlock+0x29/0x40 [ 476.501919] vfs_kern_mount.part.0+0x27/0x470 [ 476.511363] do_mount+0x113c/0x2f10 [ 476.515075] ? copy_mount_string+0x40/0x40 [ 476.519317] ? copy_mount_options+0x1da/0x380 [ 476.523837] ? copy_mount_options+0x1e9/0x380 [ 476.528330] ? copy_mount_options+0x26f/0x380 [ 476.532812] ksys_mount+0xcf/0x130 [ 476.536351] __x64_sys_mount+0xba/0x150 [ 476.540351] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 476.544925] do_syscall_64+0xf9/0x620 [ 476.548717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.553894] RIP: 0033:0x46090a [ 476.557087] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 476.575995] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 476.583882] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 476.591143] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 476.598414] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 476.605698] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 476.612957] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) wait4(0x0, 0x0, 0x8, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) accept4$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10, 0x800) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000240)=0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000200)={0x56, &(0x7f0000000180)=""/86}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r2, 0xfffffffffffffffe, &(0x7f0000000300)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x7000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) mount(&(0x7f0000000300)=@filename='./file0/file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='gfs2meta\x00', 0x1000000, &(0x7f00000005c0)='configfs\x00') sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="020a000002000000004b98d8f7c68400000000e300002f657c85e2501b462e0ee4f0c0405782051b1484ddb1bc7daa082d2909702613d764d732fd1d114d18e0ac8439e9a35e4e6d1ce1f60ba067f6dc5f61933b0cdad524f7bb9eb62a800e300f5c2c11efe91d812d7e43ff23a47cadb3ad4544328587573e93e323259ccae9bfeb4e867f62ab74482a3a0000000000000081ad8bd15504a7b8361d"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/38, 0x26}, {&(0x7f0000000100)=""/8, 0x8}], 0x2, &(0x7f0000000200)=""/250, 0xfa}}, {{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/96, 0x60}, 0x6}], 0x2, 0x1, &(0x7f0000000440)={0x0, 0x989680}) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000000)) 14:46:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:38 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) getpid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x300, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000140)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000140)) ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) 14:46:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x8000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 476.797941] FAULT_INJECTION: forcing a failure. [ 476.797941] name failslab, interval 1, probability 0, space 0, times 0 [ 476.815418] gfs2: path_lookup on ./file0/file0 returned error -2 [ 476.821935] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 476.855964] CPU: 1 PID: 18612 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 476.857037] gfs2: path_lookup on ./file0/file0 returned error -2 [ 476.863910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.879417] Call Trace: [ 476.882022] dump_stack+0x1fc/0x2fe [ 476.885666] should_fail.cold+0xa/0x14 [ 476.889575] ? setup_fault_attr+0x200/0x200 [ 476.893906] ? lock_acquire+0x170/0x3c0 [ 476.897903] __should_failslab+0x115/0x180 [ 476.902236] should_failslab+0x5/0xf [ 476.906062] __kmalloc_track_caller+0x2a6/0x3c0 [ 476.910738] ? kstrdup_const+0x53/0x80 [ 476.914633] kstrdup+0x36/0x70 [ 476.917831] kstrdup_const+0x53/0x80 [ 476.921550] alloc_vfsmnt+0xb5/0x780 [ 476.925271] ? _raw_read_unlock+0x29/0x40 [ 476.929431] vfs_kern_mount.part.0+0x27/0x470 [ 476.933933] do_mount+0x113c/0x2f10 [ 476.937558] ? lock_acquire+0x170/0x3c0 [ 476.941521] ? check_preemption_disabled+0x41/0x280 [ 476.946525] ? copy_mount_string+0x40/0x40 [ 476.950779] ? copy_mount_options+0x59/0x380 [ 476.955261] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 476.960265] ? kmem_cache_alloc_trace+0x323/0x380 [ 476.965118] ? copy_mount_options+0x26f/0x380 [ 476.969610] ksys_mount+0xcf/0x130 [ 476.973139] __x64_sys_mount+0xba/0x150 [ 476.977105] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 476.981674] do_syscall_64+0xf9/0x620 [ 476.985569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.990947] RIP: 0033:0x46090a [ 476.994128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 477.013450] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 477.021902] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 477.029158] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 477.036412] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 477.043667] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 14:46:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xe000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 477.050935] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='vfat\x00', 0x50000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0xfffffff9, 0x1}, 0x20) 14:46:40 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x53030000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 479.444351] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 479.465299] FAULT_INJECTION: forcing a failure. [ 479.465299] name failslab, interval 1, probability 0, space 0, times 0 [ 479.481320] CPU: 0 PID: 18651 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 479.489237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.498588] Call Trace: [ 479.501167] dump_stack+0x1fc/0x2fe [ 479.504788] should_fail.cold+0xa/0x14 [ 479.508672] ? setup_fault_attr+0x200/0x200 [ 479.512981] ? lock_acquire+0x170/0x3c0 [ 479.516955] __should_failslab+0x115/0x180 [ 479.521203] should_failslab+0x5/0xf [ 479.524921] kmem_cache_alloc+0x277/0x370 [ 479.529079] getname_kernel+0x4e/0x370 [ 479.532975] kern_path+0x1b/0x40 [ 479.536339] lookup_bdev+0xfc/0x220 [ 479.539947] ? bd_acquire+0x440/0x440 [ 479.543733] blkdev_get_by_path+0x1b/0xd0 [ 479.547870] mount_bdev+0x5b/0x3b0 [ 479.551394] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 479.556483] mount_fs+0xa3/0x30c [ 479.559850] vfs_kern_mount.part.0+0x68/0x470 [ 479.564332] do_mount+0x113c/0x2f10 [ 479.568128] ? do_raw_spin_unlock+0x171/0x230 [ 479.572606] ? check_preemption_disabled+0x41/0x280 [ 479.577618] ? copy_mount_string+0x40/0x40 [ 479.581839] ? copy_mount_options+0x59/0x380 [ 479.586238] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 479.591244] ? kmem_cache_alloc_trace+0x323/0x380 [ 479.596084] ? copy_mount_options+0x26f/0x380 [ 479.600576] ksys_mount+0xcf/0x130 [ 479.604104] __x64_sys_mount+0xba/0x150 [ 479.608081] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 479.612678] do_syscall_64+0xf9/0x620 [ 479.616471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.621661] RIP: 0033:0x46090a [ 479.624851] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480)='/dev/bsg\x00', 0xa4800, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f00000004c0)={0x1, @pix={0x800, 0x8, 0x30314442, 0x9, 0x7f, 0xfffffffc, 0x3, 0x4, 0x1, 0x6, 0x2, 0x5}}) ptrace$cont(0x7, r1, 0x0, 0x0) syz_mount_image$omfs(&(0x7f0000000000)='omfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x4, &(0x7f0000000380)=[{&(0x7f0000000080)="f202f62c52e13be739a4a25be16adf85f4fecca4d887f26417c2c8a603e3a7371af56bbcbcf7033458ab0fe23f43f973391f0541593f2265e45b2929f90b10b8bc14ff538a8c3517f11f20ba97d11dd6c80585b7b79d16ee7fff5a8ec302fdf66bd278b7e7", 0x65, 0x80}, {&(0x7f0000000100)="48d4ecb936484afd35031f39b46b37855a546f02e30eb089f6723d30a327dbb54a4d4bc93a069c0be6d24b3afe6f545797eb8d", 0x33, 0x8001}, {&(0x7f00000001c0)="1e319d35f2c66b86ec66f6eede0ed96bcedee113a3946440ef050450f6aee39a5286b451f97bc18800bfa5b72041fbe24e541fa9abe48bfdc3b82ec87288faae0afa8e67483477bd248b1eeeea6882de52f37508503ccfe84fd72330e10ac0c9450f4241b269f582b996b578809af0fee7af552f0c68de6631d267a81a5220802ea2565985d0cd9807d0c3efbf43c7bd8f17a8698f924c31e58ad9e174a6304fa4c360f9b93a73e24364d00f6f8633374e2f9f88915d572c1559cc3b7bc8abfda963bbf60b6e1d7faadd8f19b492a8ea41ca626e6c31784a07a3642cf441a4873091ca991995614ad7", 0xe9, 0x6}, {&(0x7f00000002c0)="3fd43738e15c3d34e7424bb4d400d54413ac22019cdb1e13e482533948b320d5b407f089837946cd3260ae20283551a7c4ab545e96511f3695f3acbc8613d7c0790c85ac699cbd4d583ce8ac7e26c6dc71c59c372cb786dacf4ae8ecfa8147d3a74aecdb7886a9bfb1cae7f57d91c8276e80fec11a78e11b7599e6688f72fd9361b7d2531bf5d65e58df2a5084277d4adc72016c45381c12c3846eb86e7e306f16a3fdc152a84466ce0685ddce009bedd200fadda3f8327dcf0d12743a43", 0xbe, 0x9}], 0x404, &(0x7f0000000400)=ANY=[@ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB='-appraise,\x00']) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000005c0)={0x1, 0x0, @ioapic={0x0, 0x427f, 0x400, 0x1, 0x0, [{0x20, 0x74, 0x20}, {0x80, 0x4, 0xab, [], 0x28}, {0x4, 0x3, 0x40, [], 0x3}, {0x3f, 0x2, 0x0, [], 0x7}, {0x7f, 0x9, 0xb9, [], 0x20}, {0x2, 0x0, 0x59, [], 0x4}, {0x3, 0x9, 0x1, [], 0x2}, {0x20, 0x74, 0x40, [], 0x4}, {0xff, 0xf8, 0x4e, [], 0xfd}, {0x1, 0x9, 0x5, [], 0x2}, {0xaf, 0xe, 0x1f, [], 0x8}, {0x6, 0x5, 0x5d, [], 0x2}, {0xff, 0x1, 0x8, [], 0x3a}, {0x6, 0x0, 0x4}, {0xd6, 0x9, 0x7f, [], 0x7f}, {0xbd, 0xc7, 0x2, [], 0x4}, {0x3, 0x20, 0x3, [], 0xd9}, {0x80, 0x7f, 0x9}, {0x6, 0x2, 0x28, [], 0x8}, {0x7, 0x0, 0x2, [], 0x4}, {0x7f, 0x8, 0x20, [], 0x20}, {0x0, 0x6, 0x81, [], 0x1}, {0x5, 0x64, 0x1, [], 0x81}, {0x6, 0xf7, 0x5, [], 0x7}]}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000800)=[@in={0x2, 0x4e24, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x327c, @empty, 0xfff}, @in={0x2, 0x4e20, @remote}], 0x3c) lseek(r0, 0x0, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) [ 479.643834] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 479.651647] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 479.658903] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 479.666159] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 479.673594] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 479.680847] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x60000000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/13, 0xd, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x1, &(0x7f0000000000)="77febe3ec19fbdd4b27eb8a4b0af15008b0395d2e1043893c03a6a3c576943d5570cebcc") ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:41 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x80ffffff, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 479.882137] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 479.945793] FAULT_INJECTION: forcing a failure. [ 479.945793] name failslab, interval 1, probability 0, space 0, times 0 [ 479.970556] CPU: 0 PID: 18681 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 479.978475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.987833] Call Trace: [ 479.990443] dump_stack+0x1fc/0x2fe [ 479.994088] should_fail.cold+0xa/0x14 [ 479.997989] ? setup_fault_attr+0x200/0x200 [ 480.002310] ? lock_acquire+0x170/0x3c0 [ 480.006300] __should_failslab+0x115/0x180 [ 480.010540] should_failslab+0x5/0xf [ 480.014263] kmem_cache_alloc_trace+0x284/0x380 [ 480.018949] ? set_bdev_super+0x110/0x110 [ 480.023101] ? ns_test_super+0x50/0x50 [ 480.026993] sget_userns+0x122/0xcd0 [ 480.030711] ? set_bdev_super+0x110/0x110 [ 480.034869] ? ns_test_super+0x50/0x50 [ 480.038765] ? set_bdev_super+0x110/0x110 [ 480.042902] ? ns_test_super+0x50/0x50 [ 480.046934] sget+0x102/0x140 [ 480.050031] mount_bdev+0xf8/0x3b0 [ 480.053557] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 480.058660] mount_fs+0xa3/0x30c [ 480.062037] vfs_kern_mount.part.0+0x68/0x470 [ 480.066532] do_mount+0x113c/0x2f10 [ 480.070154] ? lock_acquire+0x170/0x3c0 [ 480.074125] ? check_preemption_disabled+0x41/0x280 [ 480.079148] ? copy_mount_string+0x40/0x40 [ 480.083376] ? copy_mount_options+0x59/0x380 [ 480.087883] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 480.092896] ? kmem_cache_alloc_trace+0x323/0x380 [ 480.097737] ? copy_mount_options+0x26f/0x380 [ 480.102229] ksys_mount+0xcf/0x130 [ 480.105778] __x64_sys_mount+0xba/0x150 [ 480.109750] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 480.114327] do_syscall_64+0xf9/0x620 [ 480.118134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.123331] RIP: 0033:0x46090a [ 480.126515] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 480.145510] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 480.153216] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 480.160480] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 480.167838] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 480.175102] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 480.182360] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x64) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xa5, "25e575a3513503b776c9cc7711cb5666b1f87b13ecefad0236f70900d63115ea757f23c06fb6cafd0330a0e9e38aeb61140035b5a410956f56de667fa55a8e4461986bd2df9392263133cd1bad4e169d157f42f26d72ffc0921d8fee981f914c13d35b7dbd887364771e44b9ebffb021771d5dd965c160cb43ca37e460b948705800d070b659f0297c81bba5617a330c402d92739a87e1e79303e76fef4a0ba46c93b62fc9"}, &(0x7f00000000c0)=0xad) lseek(r0, 0x0, 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) 14:46:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x9effffff, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:43 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xf0ffffff, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xfffff000, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 482.535828] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 482.570053] FAULT_INJECTION: forcing a failure. [ 482.570053] name failslab, interval 1, probability 0, space 0, times 0 [ 482.606612] CPU: 1 PID: 18706 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 482.614527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.623901] Call Trace: [ 482.626500] dump_stack+0x1fc/0x2fe [ 482.630137] should_fail.cold+0xa/0x14 [ 482.634020] ? setup_fault_attr+0x200/0x200 [ 482.638348] ? lock_acquire+0x170/0x3c0 [ 482.642320] __should_failslab+0x115/0x180 [ 482.646543] should_failslab+0x5/0xf [ 482.650254] __kmalloc+0x2ab/0x3c0 [ 482.653780] ? __list_lru_init+0xd3/0x7f0 [ 482.657935] __list_lru_init+0xd3/0x7f0 [ 482.661910] ? up_write+0x18/0x150 [ 482.665460] sget_userns+0x7e2/0xcd0 [ 482.669162] ? set_bdev_super+0x110/0x110 [ 482.673308] ? ns_test_super+0x50/0x50 [ 482.677185] ? set_bdev_super+0x110/0x110 [ 482.681334] ? ns_test_super+0x50/0x50 [ 482.685734] sget+0x102/0x140 [ 482.688828] mount_bdev+0xf8/0x3b0 [ 482.692357] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 482.697451] mount_fs+0xa3/0x30c [ 482.700821] vfs_kern_mount.part.0+0x68/0x470 [ 482.705304] do_mount+0x113c/0x2f10 [ 482.709013] ? lock_acquire+0x170/0x3c0 [ 482.712987] ? check_preemption_disabled+0x41/0x280 [ 482.718007] ? copy_mount_string+0x40/0x40 [ 482.722245] ? copy_mount_options+0x59/0x380 [ 482.726645] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 482.731646] ? kmem_cache_alloc_trace+0x323/0x380 [ 482.736483] ? copy_mount_options+0x26f/0x380 [ 482.740965] ksys_mount+0xcf/0x130 [ 482.744494] __x64_sys_mount+0xba/0x150 [ 482.748540] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 482.753124] do_syscall_64+0xf9/0x620 [ 482.756927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.762102] RIP: 0033:0x46090a [ 482.765293] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 482.784264] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 482.791969] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 482.799238] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 14:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 482.806933] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 482.814210] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 482.822276] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x274, r1, 0x101, 0x70bd28, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x4}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_FRAME={0x248, 0x33, @data_frame={@qos_no_ht={{@type10={{0x0, 0x2, 0xf, 0x1, 0x0, 0x1, 0x1}, {0x8}, @random="30383df617e6", @device_a, @device_b, {0x5}}, {0x8, 0x1, 0x0, 0x0, 0x9}}, {@type11={{0x0, 0x2, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1}, {}, @device_a, @broadcast, @from_mac=@broadcast, {0x5}, @broadcast}, {0x7, 0x0, 0x0, 0x1, 0xd0}}}, @random="9d44a81c6c164df140b4ec76890b09553a7c1e0b57ed66d2b54997c534c30297bc4253984b49f3ad772e32eb7eb414d527981e392c3da52c6cdd15d4b31546d4dbc7ea0cb3d8461f01b5fa2b6fb091537343e22e02dce866c9d1af224924a9060a9418b274b91345129ac0d31921d104433cbfc17731853ec001717830b5faebb41512d8c69fb479d4bd6dbb7fd333f9027c50deb9f2f493600ed81f248671966e3a4dfe415f8f40a5d14df15627a0c6a59e4acce9ea5a83f9a47e8555a98a489e8324fa30f785ff981844dc1a280bb2400d97931151711c374c9ecb414a3641312743782b30cf9de94e0f99c60f1d6f5832f187ad5e7a0b220dfab8f994558bf7184959ff7caa612b0cd6b4b1eb2794f34f025c5e927be2d9f7cf7f0585031fa5920ca89ad0f2e10177715cefa263f4e79155e676ef66bdad170ff7956fa587dd572a49fc2f5969a6cd30e84a5e10a4d4af763fdd8badc8491dbc86564dbda0d416204aa3c18c2d16a38c4ce56137e756a5c0d253c237e6c29b109e1375609d078dc355608c25106900946ad71025084362f117f04b7efb196cebdbd90edfed22f30744813414a2d9b362890aa950936350870150ea9f43a9e1cd1b9c4e2fef2c2ea96e932465c975a2848acb3849432b3948d4a375be90c1b0d2e2b69c5895853fb3bd8efba0fa343abffc84ddde5e7269643a8f11d9151482a219f9d1848e1252e7d7a2dcca42f8f7"}}]}, 0x274}, 0x1, 0x0, 0x0, 0x181}, 0x44000) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x0, 0x6) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3d) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r4, 0x0, 0x0) 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xffffff7f, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xffffff80, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 482.938726] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xffffff9e, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500"/19, 0x13, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:44 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xfffffff0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 483.122343] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 483.143551] FAULT_INJECTION: forcing a failure. [ 483.143551] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.155383] CPU: 1 PID: 18752 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 483.163270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.172626] Call Trace: [ 483.175225] dump_stack+0x1fc/0x2fe [ 483.178868] should_fail.cold+0xa/0x14 [ 483.182767] ? setup_fault_attr+0x200/0x200 [ 483.187101] ? get_page_from_freelist+0x1d60/0x4170 [ 483.192129] ? bad_range+0x260/0x3c0 [ 483.195895] __alloc_pages_nodemask+0x239/0x2890 [ 483.201013] ? kernel_poison_pages+0x2c/0x2a0 [ 483.205517] ? get_page_from_freelist+0x1d01/0x4170 [ 483.210543] ? preempt_count_add+0xaf/0x190 [ 483.214874] ? __lock_acquire+0x6de/0x3ff0 [ 483.219123] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 483.223970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.229410] ? should_fail+0x142/0x7b0 [ 483.233306] ? lock_acquire+0x170/0x3c0 [ 483.237291] ? check_preemption_disabled+0x41/0x280 [ 483.242325] cache_grow_begin+0xa4/0x8a0 [ 483.246578] ? setup_fault_attr+0x200/0x200 [ 483.250905] ? lock_acquire+0x170/0x3c0 [ 483.254886] cache_alloc_refill+0x273/0x340 [ 483.259219] kmem_cache_alloc+0x346/0x370 [ 483.263377] getname_kernel+0x4e/0x370 [ 483.267273] kern_path+0x1b/0x40 [ 483.270646] lookup_bdev+0xfc/0x220 [ 483.274274] ? bd_acquire+0x440/0x440 [ 483.278086] blkdev_get_by_path+0x1b/0xd0 [ 483.282243] mount_bdev+0x5b/0x3b0 [ 483.285796] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 483.290914] mount_fs+0xa3/0x30c [ 483.294293] vfs_kern_mount.part.0+0x68/0x470 [ 483.298799] do_mount+0x113c/0x2f10 [ 483.302436] ? do_raw_spin_unlock+0x171/0x230 [ 483.306981] ? check_preemption_disabled+0x41/0x280 [ 483.312015] ? copy_mount_string+0x40/0x40 [ 483.316255] ? copy_mount_options+0x59/0x380 [ 483.320671] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 483.325691] ? kmem_cache_alloc_trace+0x323/0x380 [ 483.330544] ? copy_mount_options+0x26f/0x380 [ 483.335048] ksys_mount+0xcf/0x130 [ 483.338595] __x64_sys_mount+0xba/0x150 [ 483.342593] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 483.347206] do_syscall_64+0xf9/0x620 [ 483.351019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.356213] RIP: 0033:0x46090a 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0xffffffff, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 483.359409] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 483.378314] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 483.386029] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 483.393306] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 483.400583] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 483.407861] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 483.415137] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 483.610470] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x2, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 483.709894] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:46:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000)=0x1, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x3, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:47 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x40000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x100000001}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x400}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'configfs\x00'}}, {@uid_eq={'uid'}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xee00}}]}}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000000c0)={0x0, 0xffffffffffffff80}) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) 14:46:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x4, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 486.005947] FAULT_INJECTION: forcing a failure. [ 486.005947] name failslab, interval 1, probability 0, space 0, times 0 [ 486.025606] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) [ 486.049912] CPU: 0 PID: 18793 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 486.057831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.067191] Call Trace: [ 486.069793] dump_stack+0x1fc/0x2fe [ 486.073438] should_fail.cold+0xa/0x14 [ 486.077369] ? setup_fault_attr+0x200/0x200 [ 486.081694] ? lock_acquire+0x170/0x3c0 [ 486.085685] __should_failslab+0x115/0x180 [ 486.089933] should_failslab+0x5/0xf [ 486.093649] __kmalloc+0x2ab/0x3c0 [ 486.097195] ? prealloc_shrinker+0x15d/0x340 [ 486.101616] prealloc_shrinker+0x15d/0x340 [ 486.105858] sget_userns+0x7b4/0xcd0 [ 486.109778] ? set_bdev_super+0x110/0x110 [ 486.114391] ? ns_test_super+0x50/0x50 [ 486.118291] ? set_bdev_super+0x110/0x110 [ 486.122445] ? ns_test_super+0x50/0x50 [ 486.126334] sget+0x102/0x140 [ 486.129744] mount_bdev+0xf8/0x3b0 [ 486.133454] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 486.138546] mount_fs+0xa3/0x30c [ 486.141901] vfs_kern_mount.part.0+0x68/0x470 [ 486.146397] do_mount+0x113c/0x2f10 [ 486.150010] ? copy_mount_string+0x40/0x40 [ 486.154243] ? copy_mount_options+0x1da/0x380 [ 486.158722] ? copy_mount_options+0x1e9/0x380 [ 486.163213] ? copy_mount_options+0x26f/0x380 [ 486.167722] ksys_mount+0xcf/0x130 [ 486.171257] __x64_sys_mount+0xba/0x150 [ 486.175244] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 486.179817] do_syscall_64+0xf9/0x620 [ 486.183718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.188890] RIP: 0033:0x46090a 14:46:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x7, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 486.192066] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 486.210959] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 486.218663] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 486.225919] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 486.233170] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 486.240421] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 486.247672] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x8, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x80000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) lseek(r0, 0x0, 0x1) [ 486.409901] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:50 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x8]}, 0x8) write$P9_RMKNOD(r1, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x8}}, 0x14) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x20, r0, 0x0, 0x80000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000040)={0x1, 0x100000000}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) 14:46:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xe, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 488.931334] FAULT_INJECTION: forcing a failure. [ 488.931334] name failslab, interval 1, probability 0, space 0, times 0 [ 488.946241] CPU: 0 PID: 18835 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 488.954148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.963517] Call Trace: [ 488.966123] dump_stack+0x1fc/0x2fe [ 488.969769] should_fail.cold+0xa/0x14 [ 488.973671] ? setup_fault_attr+0x200/0x200 [ 488.978010] ? lock_acquire+0x170/0x3c0 [ 488.982011] __should_failslab+0x115/0x180 [ 488.986257] should_failslab+0x5/0xf [ 488.989972] __kmalloc+0x2ab/0x3c0 [ 488.993520] ? __list_lru_init+0xd3/0x7f0 [ 488.997678] __list_lru_init+0xd3/0x7f0 [ 489.001673] ? up_write+0x18/0x150 [ 489.005253] sget_userns+0x7e2/0xcd0 [ 489.008978] ? set_bdev_super+0x110/0x110 [ 489.013140] ? ns_test_super+0x50/0x50 [ 489.017037] ? set_bdev_super+0x110/0x110 [ 489.021189] ? ns_test_super+0x50/0x50 [ 489.025082] sget+0x102/0x140 [ 489.028199] mount_bdev+0xf8/0x3b0 14:46:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 489.031746] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 489.036859] mount_fs+0xa3/0x30c [ 489.040240] vfs_kern_mount.part.0+0x68/0x470 [ 489.044745] do_mount+0x113c/0x2f10 [ 489.048383] ? do_raw_spin_unlock+0x171/0x230 [ 489.052882] ? check_preemption_disabled+0x41/0x280 [ 489.057908] ? copy_mount_string+0x40/0x40 [ 489.062153] ? copy_mount_options+0x59/0x380 [ 489.066662] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 489.071697] ? kmem_cache_alloc_trace+0x323/0x380 [ 489.076561] ? copy_mount_options+0x26f/0x380 [ 489.081120] ksys_mount+0xcf/0x130 [ 489.084681] __x64_sys_mount+0xba/0x150 [ 489.088664] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 489.093255] do_syscall_64+0xf9/0x620 [ 489.097073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.102284] RIP: 0033:0x46090a [ 489.105466] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.124366] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 489.132072] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 489.139325] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 489.146591] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 489.153850] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 489.161189] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:50 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 489.215636] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:46:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x60, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x8001, 0x8, 0x6, 0xb226, 0xc, "06dfc2d6cdc995d4"}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:46:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 489.320705] FAULT_INJECTION: forcing a failure. [ 489.320705] name failslab, interval 1, probability 0, space 0, times 0 [ 489.358815] CPU: 0 PID: 18866 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 489.366733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.376104] Call Trace: [ 489.378710] dump_stack+0x1fc/0x2fe [ 489.382358] should_fail.cold+0xa/0x14 [ 489.386262] ? setup_fault_attr+0x200/0x200 [ 489.390590] ? lock_acquire+0x170/0x3c0 [ 489.394581] __should_failslab+0x115/0x180 [ 489.398831] should_failslab+0x5/0xf [ 489.402563] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 489.407679] __kmalloc_node+0x38/0x70 [ 489.411933] kvmalloc_node+0x61/0xf0 [ 489.415661] __list_lru_init+0x4c6/0x7f0 [ 489.417895] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 489.419727] ? up_read+0x83/0x110 [ 489.432763] sget_userns+0x7e2/0xcd0 [ 489.436486] ? set_bdev_super+0x110/0x110 [ 489.440644] ? ns_test_super+0x50/0x50 [ 489.444543] ? set_bdev_super+0x110/0x110 [ 489.448697] ? ns_test_super+0x50/0x50 [ 489.452591] sget+0x102/0x140 [ 489.455706] mount_bdev+0xf8/0x3b0 [ 489.459260] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 489.464373] mount_fs+0xa3/0x30c [ 489.467748] vfs_kern_mount.part.0+0x68/0x470 [ 489.472255] do_mount+0x113c/0x2f10 [ 489.475909] ? lock_acquire+0x170/0x3c0 [ 489.479888] ? check_preemption_disabled+0x41/0x280 [ 489.484922] ? copy_mount_string+0x40/0x40 [ 489.489163] ? copy_mount_options+0x59/0x380 [ 489.493578] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 489.498602] ? kmem_cache_alloc_trace+0x323/0x380 [ 489.503446] ? copy_mount_options+0x26f/0x380 [ 489.508138] ksys_mount+0xcf/0x130 [ 489.511783] __x64_sys_mount+0xba/0x150 [ 489.515865] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 489.520433] do_syscall_64+0xf9/0x620 [ 489.524282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.529467] RIP: 0033:0x46090a [ 489.532668] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 489.551557] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 489.559279] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a 14:46:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000000)={0x5ff800, {0x20, 0x2, 0x7, 0xff}}) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:46:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 489.566543] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 489.573822] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 489.581081] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 489.588348] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x52, "722cecf020a0196225cae71ab440c524fe583d110e7458ef934d2e6c51b5e9965b12d51e6db0828f00090d5ae482f6734c99c067a6991e527fe76273f8409998292c5d1ed0c1fd60c4e6777cf92d2402c93d"}, &(0x7f0000000100)=0x5a) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x1, 0x1, [0x8]}, 0xa) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x300, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="050000000000000000000000000000000000000004010000", 0x18, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) lseek(r0, 0x0, 0x1) 14:46:53 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 492.012275] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 492.040194] FAULT_INJECTION: forcing a failure. [ 492.040194] name failslab, interval 1, probability 0, space 0, times 0 [ 492.069412] CPU: 0 PID: 18913 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 492.077684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.087044] Call Trace: [ 492.090327] dump_stack+0x1fc/0x2fe [ 492.093946] should_fail.cold+0xa/0x14 [ 492.097820] ? setup_fault_attr+0x200/0x200 [ 492.102124] ? lock_acquire+0x170/0x3c0 [ 492.106162] __should_failslab+0x115/0x180 [ 492.110393] should_failslab+0x5/0xf [ 492.114098] __kmalloc+0x2ab/0x3c0 [ 492.117644] ? __list_lru_init+0xd3/0x7f0 [ 492.121784] __list_lru_init+0xd3/0x7f0 [ 492.126024] ? up_read+0x83/0x110 [ 492.129489] sget_userns+0x810/0xcd0 [ 492.133185] ? set_bdev_super+0x110/0x110 [ 492.137404] ? ns_test_super+0x50/0x50 [ 492.141274] ? set_bdev_super+0x110/0x110 [ 492.145422] ? ns_test_super+0x50/0x50 [ 492.149306] sget+0x102/0x140 [ 492.152398] mount_bdev+0xf8/0x3b0 [ 492.155921] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 492.161005] mount_fs+0xa3/0x30c [ 492.164372] vfs_kern_mount.part.0+0x68/0x470 [ 492.168892] do_mount+0x113c/0x2f10 [ 492.172514] ? lock_acquire+0x170/0x3c0 [ 492.176471] ? check_preemption_disabled+0x41/0x280 [ 492.181485] ? copy_mount_string+0x40/0x40 [ 492.185731] ? copy_mount_options+0x59/0x380 [ 492.190148] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 492.195162] ? kmem_cache_alloc_trace+0x323/0x380 [ 492.200012] ? copy_mount_options+0x26f/0x380 [ 492.204594] ksys_mount+0xcf/0x130 [ 492.208143] __x64_sys_mount+0xba/0x150 [ 492.212130] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 492.216958] do_syscall_64+0xf9/0x620 [ 492.220752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.225935] RIP: 0033:0x46090a [ 492.229128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 492.248123] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 492.255832] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 492.263089] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 14:46:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x353, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 492.270348] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 492.279001] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 492.286277] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x1a1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={r3, 0x1}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={r3, 0xa7, 0x3d, "ae9a00e948881e66bd75285fb14f51492f2537a135bd1195de92db9c71cc325bbebdefc25d24e59e55421c71db6699d716261e3f73c6f89108ad5f7389"}, 0x45) lseek(r0, 0x0, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1) bind$rose(r4, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0xffffffff, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x40) 14:46:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x700, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 492.333025] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 14:46:53 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 492.460636] FAULT_INJECTION: forcing a failure. [ 492.460636] name failslab, interval 1, probability 0, space 0, times 0 [ 492.487938] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 492.511184] CPU: 0 PID: 18945 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 492.519104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.528903] Call Trace: [ 492.531520] dump_stack+0x1fc/0x2fe [ 492.535167] should_fail.cold+0xa/0x14 [ 492.539077] ? setup_fault_attr+0x200/0x200 [ 492.543406] ? lock_acquire+0x170/0x3c0 [ 492.547387] __should_failslab+0x115/0x180 [ 492.551639] should_failslab+0x5/0xf [ 492.555347] __kmalloc+0x2ab/0x3c0 [ 492.558881] ? __list_lru_init+0xd3/0x7f0 [ 492.563026] __list_lru_init+0xd3/0x7f0 [ 492.566986] ? up_write+0x18/0x150 [ 492.570778] sget_userns+0x7e2/0xcd0 [ 492.574478] ? set_bdev_super+0x110/0x110 [ 492.578612] ? ns_test_super+0x50/0x50 [ 492.582522] ? set_bdev_super+0x110/0x110 [ 492.586664] ? ns_test_super+0x50/0x50 [ 492.590548] sget+0x102/0x140 [ 492.593645] mount_bdev+0xf8/0x3b0 [ 492.597196] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 492.602301] mount_fs+0xa3/0x30c [ 492.605685] vfs_kern_mount.part.0+0x68/0x470 [ 492.610170] do_mount+0x113c/0x2f10 [ 492.613804] ? do_raw_spin_unlock+0x171/0x230 [ 492.618374] ? check_preemption_disabled+0x41/0x280 [ 492.623385] ? copy_mount_string+0x40/0x40 [ 492.627609] ? copy_mount_options+0x59/0x380 [ 492.632002] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 492.637017] ? kmem_cache_alloc_trace+0x323/0x380 [ 492.642042] ? copy_mount_options+0x26f/0x380 [ 492.646529] ksys_mount+0xcf/0x130 [ 492.650059] __x64_sys_mount+0xba/0x150 [ 492.654021] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 492.658591] do_syscall_64+0xf9/0x620 [ 492.663513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.668688] RIP: 0033:0x46090a [ 492.671864] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 492.690768] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 492.698466] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 492.705732] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 492.713017] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 492.720715] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 492.727980] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="7ac37381dc9b05a7de8eccbb263bfb72b1c9311e2b0642182ffae14df22e4e6fe9670fcb6251771e2a94a5bf07e758d4d1fae557c35bd4b387652ff8f9b5292fb218"}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x3) ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f0000000000)=0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000040)) 14:46:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xe00, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:46:56 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234", 0x31}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf00, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0xb2f) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 495.077985] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 495.083772] FAULT_INJECTION: forcing a failure. [ 495.083772] name failslab, interval 1, probability 0, space 0, times 0 [ 495.100603] CPU: 1 PID: 18968 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 495.108517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.117881] Call Trace: [ 495.120663] dump_stack+0x1fc/0x2fe [ 495.124311] should_fail.cold+0xa/0x14 14:46:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x5303, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 495.128211] ? setup_fault_attr+0x200/0x200 [ 495.132542] ? lock_acquire+0x170/0x3c0 [ 495.136524] __should_failslab+0x115/0x180 [ 495.140946] should_failslab+0x5/0xf [ 495.144651] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 495.149751] __kmalloc_node+0x38/0x70 [ 495.153544] kvmalloc_node+0x61/0xf0 [ 495.157274] __list_lru_init+0x4c6/0x7f0 [ 495.161329] ? up_read+0x83/0x110 [ 495.164775] sget_userns+0x810/0xcd0 [ 495.168471] ? set_bdev_super+0x110/0x110 [ 495.172605] ? ns_test_super+0x50/0x50 [ 495.176477] ? set_bdev_super+0x110/0x110 [ 495.180623] ? ns_test_super+0x50/0x50 [ 495.184494] sget+0x102/0x140 [ 495.188022] mount_bdev+0xf8/0x3b0 [ 495.191546] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 495.196645] mount_fs+0xa3/0x30c [ 495.199999] vfs_kern_mount.part.0+0x68/0x470 [ 495.204498] do_mount+0x113c/0x2f10 [ 495.208112] ? lock_acquire+0x170/0x3c0 [ 495.212076] ? check_preemption_disabled+0x41/0x280 [ 495.217087] ? copy_mount_string+0x40/0x40 [ 495.221306] ? copy_mount_options+0x59/0x380 [ 495.225710] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 495.230753] ? kmem_cache_alloc_trace+0x323/0x380 [ 495.235606] ? copy_mount_options+0x26f/0x380 [ 495.240098] ksys_mount+0xcf/0x130 [ 495.243633] __x64_sys_mount+0xba/0x150 [ 495.247595] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 495.252164] do_syscall_64+0xf9/0x620 [ 495.255971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.261145] RIP: 0033:0x46090a [ 495.264321] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 495.283208] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 495.291886] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 495.299259] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 495.306540] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 495.313797] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 495.321053] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x6000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:56 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 495.439089] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 495.501496] FAULT_INJECTION: forcing a failure. [ 495.501496] name failslab, interval 1, probability 0, space 0, times 0 [ 495.518477] CPU: 0 PID: 19004 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 495.526394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.535761] Call Trace: [ 495.538364] dump_stack+0x1fc/0x2fe [ 495.542014] should_fail.cold+0xa/0x14 [ 495.545956] ? setup_fault_attr+0x200/0x200 [ 495.550378] ? lock_acquire+0x170/0x3c0 [ 495.554377] __should_failslab+0x115/0x180 [ 495.558631] should_failslab+0x5/0xf [ 495.562451] kmem_cache_alloc_trace+0x284/0x380 [ 495.567136] ext4_fill_super+0x205/0xc820 [ 495.571297] ? enable_ptr_key_workfn+0x30/0x30 [ 495.575904] ? vsnprintf+0x2cc/0x14f0 [ 495.579720] ? pointer+0x850/0x850 [ 495.583287] ? lock_downgrade+0x720/0x720 [ 495.587453] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 495.592581] ? snprintf+0xbb/0xf0 [ 495.596051] ? vsprintf+0x30/0x30 [ 495.599524] ? wait_for_completion_io+0x10/0x10 [ 495.604207] ? set_blocksize+0x163/0x3f0 [ 495.608282] mount_bdev+0x2fc/0x3b0 [ 495.611924] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 495.617095] mount_fs+0xa3/0x30c [ 495.620485] vfs_kern_mount.part.0+0x68/0x470 [ 495.625176] do_mount+0x113c/0x2f10 [ 495.629000] ? retint_kernel+0x2d/0x2d [ 495.632986] ? copy_mount_string+0x40/0x40 [ 495.637254] ? copy_mount_options+0x1cd/0x380 [ 495.642129] ? write_comp_data+0x6/0x70 [ 495.646123] ? copy_mount_options+0x26f/0x380 [ 495.651166] ksys_mount+0xcf/0x130 [ 495.654723] __x64_sys_mount+0xba/0x150 [ 495.658703] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 495.663280] do_syscall_64+0xf9/0x620 [ 495.667080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.672263] RIP: 0033:0x46090a [ 495.675445] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 495.694334] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 495.702035] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 495.709385] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 495.716643] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 495.723901] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 495.731161] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:46:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) accept4$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@remote, @null, @null, @netrom, @null, @remote, @default, @netrom]}, &(0x7f00000001c0)=0x48, 0x80000) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200)={0x36, 0x6, 0x3, 0x1ff}, 0x8) 14:46:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:59 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234", 0x31}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 498.059531] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 498.086489] FAULT_INJECTION: forcing a failure. [ 498.086489] name failslab, interval 1, probability 0, space 0, times 0 [ 498.114440] CPU: 1 PID: 19027 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 498.122362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.131841] Call Trace: [ 498.135065] dump_stack+0x1fc/0x2fe [ 498.138693] should_fail.cold+0xa/0x14 [ 498.142566] ? setup_fault_attr+0x200/0x200 [ 498.146871] ? lock_acquire+0x170/0x3c0 [ 498.150856] __should_failslab+0x115/0x180 [ 498.155094] should_failslab+0x5/0xf [ 498.158821] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 498.163921] __kmalloc_node+0x38/0x70 [ 498.167715] kvmalloc_node+0x61/0xf0 [ 498.171871] __list_lru_init+0x4c6/0x7f0 [ 498.175916] ? up_read+0x83/0x110 [ 498.179529] sget_userns+0x810/0xcd0 [ 498.183226] ? set_bdev_super+0x110/0x110 [ 498.187362] ? ns_test_super+0x50/0x50 [ 498.191233] ? set_bdev_super+0x110/0x110 [ 498.195379] ? ns_test_super+0x50/0x50 [ 498.199250] sget+0x102/0x140 [ 498.202380] mount_bdev+0xf8/0x3b0 [ 498.205925] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 498.211014] mount_fs+0xa3/0x30c [ 498.214367] vfs_kern_mount.part.0+0x68/0x470 [ 498.218847] do_mount+0x113c/0x2f10 [ 498.222458] ? do_raw_spin_unlock+0x171/0x230 [ 498.227040] ? check_preemption_disabled+0x41/0x280 [ 498.232076] ? copy_mount_string+0x40/0x40 [ 498.236294] ? copy_mount_options+0x59/0x380 [ 498.240708] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 498.245707] ? kmem_cache_alloc_trace+0x323/0x380 [ 498.250551] ? copy_mount_options+0x26f/0x380 [ 498.255470] ksys_mount+0xcf/0x130 [ 498.258996] __x64_sys_mount+0xba/0x150 [ 498.262956] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 498.267521] do_syscall_64+0xf9/0x620 [ 498.271317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.276491] RIP: 0033:0x46090a [ 498.279754] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.298643] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 498.306434] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a 14:46:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x34000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x4200, 0x0) dup2(r1, r0) [ 498.313707] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 498.320961] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 498.328215] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 498.335509] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:46:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:46:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x400300, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:46:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES16=r0, @ANYBLOB="000825bd7000fddbdf25150000000c0009800800010080ffffff1c00038008000300010000000000000003a09301000008000200040000000800"], 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='minix\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000600)=""/4096, &(0x7f0000000240)=0x1000) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000001c0)=""/59, &(0x7f0000000200)=0x3b) 14:46:59 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 498.463267] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 498.549615] FAULT_INJECTION: forcing a failure. [ 498.549615] name failslab, interval 1, probability 0, space 0, times 0 [ 498.571550] CPU: 0 PID: 19065 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 498.579450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.588981] Call Trace: [ 498.591585] dump_stack+0x1fc/0x2fe [ 498.595233] should_fail.cold+0xa/0x14 [ 498.599138] ? setup_fault_attr+0x200/0x200 [ 498.603475] ? lock_acquire+0x170/0x3c0 [ 498.607473] __should_failslab+0x115/0x180 [ 498.611727] should_failslab+0x5/0xf [ 498.615466] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 498.620755] __kmalloc_node+0x38/0x70 [ 498.624570] kvmalloc_node+0x61/0xf0 [ 498.628301] __list_lru_init+0x4c6/0x7f0 [ 498.632373] ? up_read+0x83/0x110 [ 498.635946] sget_userns+0x810/0xcd0 [ 498.640284] ? set_bdev_super+0x110/0x110 [ 498.644494] ? ns_test_super+0x50/0x50 [ 498.648399] ? set_bdev_super+0x110/0x110 [ 498.652559] ? ns_test_super+0x50/0x50 [ 498.656474] sget+0x102/0x140 [ 498.659601] mount_bdev+0xf8/0x3b0 [ 498.663155] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 498.668274] mount_fs+0xa3/0x30c [ 498.671656] vfs_kern_mount.part.0+0x68/0x470 [ 498.676165] do_mount+0x113c/0x2f10 [ 498.679812] ? do_raw_spin_unlock+0x171/0x230 [ 498.684322] ? check_preemption_disabled+0x41/0x280 [ 498.689340] ? copy_mount_string+0x40/0x40 [ 498.693568] ? copy_mount_options+0x59/0x380 [ 498.698660] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 498.703934] ? kmem_cache_alloc_trace+0x323/0x380 [ 498.708788] ? copy_mount_options+0x26f/0x380 [ 498.713549] ksys_mount+0xcf/0x130 [ 498.717092] __x64_sys_mount+0xba/0x150 [ 498.721048] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 498.725617] do_syscall_64+0xf9/0x620 [ 498.729403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.734592] RIP: 0033:0x46090a [ 498.737769] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.756657] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 498.764785] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 498.772065] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 498.779319] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 498.786580] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 498.794183] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf0ffff, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) getrandom(&(0x7f0000000040)=""/165, 0xa5, 0x2) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffd, 0x1) r1 = socket$rds(0x15, 0x5, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x200, 0x5) 14:47:02 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 501.078375] FAULT_INJECTION: forcing a failure. [ 501.078375] name failslab, interval 1, probability 0, space 0, times 0 [ 501.108945] CPU: 1 PID: 19083 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 501.110367] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 501.116852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.116858] Call Trace: [ 501.116880] dump_stack+0x1fc/0x2fe [ 501.116900] should_fail.cold+0xa/0x14 [ 501.116916] ? setup_fault_attr+0x200/0x200 [ 501.116931] ? lock_acquire+0x170/0x3c0 [ 501.116955] __should_failslab+0x115/0x180 [ 501.117030] should_failslab+0x5/0xf [ 501.158525] kmem_cache_alloc_trace+0x284/0x380 [ 501.163207] ext4_fill_super+0x205/0xc820 [ 501.167362] ? enable_ptr_key_workfn+0x30/0x30 [ 501.171967] ? vsnprintf+0x2cc/0x14f0 [ 501.175787] ? pointer+0x850/0x850 [ 501.179334] ? lock_downgrade+0x720/0x720 [ 501.183492] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 501.188606] ? snprintf+0xbb/0xf0 [ 501.189990] ptrace attach of "/root/syz-executor.5"[19098] was attempted by "/root/syz-executor.5"[19099] [ 501.192064] ? vsprintf+0x30/0x30 [ 501.192082] ? wait_for_completion_io+0x10/0x10 [ 501.192098] ? set_blocksize+0x163/0x3f0 [ 501.214104] mount_bdev+0x2fc/0x3b0 [ 501.218195] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 501.223312] mount_fs+0xa3/0x30c [ 501.226692] vfs_kern_mount.part.0+0x68/0x470 [ 501.231198] do_mount+0x113c/0x2f10 [ 501.234837] ? retint_kernel+0x2d/0x2d [ 501.238736] ? copy_mount_string+0x40/0x40 [ 501.242972] ? copy_mount_options+0x1da/0x380 [ 501.248345] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 501.253231] ? copy_mount_options+0x26f/0x380 [ 501.257726] ksys_mount+0xcf/0x130 [ 501.261252] __x64_sys_mount+0xba/0x150 [ 501.265226] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 501.269900] do_syscall_64+0xf9/0x620 [ 501.273711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.278905] RIP: 0033:0x46090a [ 501.282091] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.301084] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 501.308782] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 501.316036] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 501.323295] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 501.330554] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 501.337806] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234", 0x31}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x1000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$setopts(0x4200, r1, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80000, 0x0) r3 = getpgid(r1) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x7, 0x200, 0x3ff, 0x5, 0x5, r3}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='minix\x00', 0x11000, &(0x7f0000000200)='configfs\x00') sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a000002fc6b8bc3d108c7f4d29d676895b13c135588bcb0243b6445db58f2ad63f443f89f47e1d1cbe47b0981f8f4b980b7de929bf59f4bbe673e09cf509667c40a294ec68d6816f7429e1248a414c9e10a83f2626eb155141e659a7c8b0810da5af1ec345dff975bed90cf55b58f55a9efefc8ab4bc03a5a419f87ea62b545ccdb1eaeb15e47ccd7b454df458c788606d99be146bfe04923ca90a5092142719444823723bc2176a1bfc81866a10166fe7eb977d4a50cf5a8a8"], 0x10}}, 0x0) fcntl$setlease(r0, 0x400, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:47:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x2000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffe000/0x2000)=nil) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:02 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 501.438648] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 14:47:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x3000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x61, 0x36, 0x62, 0x39, 0x35, 0x35, 0x63, 0x34, 0x38, 0x34, 0x32, 0x65, 0x3d, 0x34, 0x63, 0x38]}, &(0x7f0000000080)={0x0, "8778e95940791f1c6553900cf84594e7c5f99e5f86d20d35266da3981efb35859317489ad7c46161b317deba74d829fa4bb2c4e2ec083880ba87e2c64ff65a33", 0x18}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r0, 0x36, 0xac}, &(0x7f00000001c0)={'enc=', 'pkcs1', ' hash=', {'sha3-256-generic\x00'}}, &(0x7f0000000240)="4878931eee896398570cb81d636a69a3c35ef45117ce938e7175d53541582ef844c0daf0a80939e9986d9b20df595f9189f8f6249aad", &(0x7f0000000280)=""/172) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:47:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x4000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 501.542384] FAULT_INJECTION: forcing a failure. [ 501.542384] name failslab, interval 1, probability 0, space 0, times 0 [ 501.580946] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 501.599257] CPU: 0 PID: 19125 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 501.607173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.616534] Call Trace: [ 501.619151] dump_stack+0x1fc/0x2fe [ 501.622783] should_fail.cold+0xa/0x14 [ 501.626659] ? setup_fault_attr+0x200/0x200 [ 501.631221] __should_failslab+0x115/0x180 [ 501.635472] should_failslab+0x5/0xf [ 501.639174] kmem_cache_alloc+0x3f/0x370 [ 501.643397] ? mempool_alloc+0x350/0x350 [ 501.647454] mempool_alloc+0x146/0x350 [ 501.651510] ? mempool_resize+0x790/0x790 [ 501.655646] ? lock_downgrade+0x720/0x720 [ 501.659793] ? mark_held_locks+0xa6/0xf0 [ 501.663858] bio_alloc_bioset+0x389/0x5e0 [ 501.667992] ? __find_get_block+0x314/0xde0 [ 501.672310] ? bvec_alloc+0x2f0/0x2f0 [ 501.676105] ? __getblk_slow+0x6a3/0x9e0 [ 501.680173] submit_bh_wbc+0x141/0x760 [ 501.684050] __bread_gfp+0x14e/0x300 [ 501.687750] ext4_fill_super+0x57b/0xc820 [ 501.691888] ? vsnprintf+0x2cc/0x14f0 [ 501.695676] ? pointer+0x850/0x850 [ 501.699199] ? lock_downgrade+0x720/0x720 [ 501.703333] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 501.708428] ? snprintf+0xbb/0xf0 [ 501.711881] ? vsprintf+0x30/0x30 [ 501.715336] ? wait_for_completion_io+0x10/0x10 [ 501.720000] ? set_blocksize+0x163/0x3f0 [ 501.724078] mount_bdev+0x2fc/0x3b0 [ 501.727696] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 501.732820] mount_fs+0xa3/0x30c [ 501.736279] vfs_kern_mount.part.0+0x68/0x470 [ 501.740780] do_mount+0x113c/0x2f10 [ 501.744400] ? lock_acquire+0x170/0x3c0 [ 501.748432] ? check_preemption_disabled+0x41/0x280 [ 501.753447] ? copy_mount_string+0x40/0x40 [ 501.757764] ? copy_mount_options+0x59/0x380 [ 501.762199] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 501.767307] ? kmem_cache_alloc_trace+0x323/0x380 [ 501.772142] ? copy_mount_options+0x26f/0x380 [ 501.776624] ksys_mount+0xcf/0x130 [ 501.780154] __x64_sys_mount+0xba/0x150 [ 501.784340] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 501.788914] do_syscall_64+0xf9/0x620 [ 501.792710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.797885] RIP: 0033:0x46090a [ 501.801063] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.820037] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 501.827731] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 501.835078] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 501.842340] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 501.849601] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 501.856862] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 501.872705] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6a", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x7000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x201000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x81204101, &(0x7f0000000000)) lseek(r0, 0x0, 0x1) 14:47:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:05 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x8000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:05 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x124, 0x0, 0x2, 0x70bd25, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x124}, 0x1, 0x0, 0x0, 0x8010}, 0x4000000) ptrace$cont(0x7, r0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 504.488492] FAULT_INJECTION: forcing a failure. [ 504.488492] name failslab, interval 1, probability 0, space 0, times 0 [ 504.519159] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 14:47:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80580, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x13c, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "4e78fc29f40ef40a23156e88b6458261bdb00b7e09a91865"}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}]}], @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x24, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "7d1ab4d8baaed504626dc1df907091d3b3a79779ed1d6a1a"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "04ea42f58e21a5ee507ac5c74dac4797228a533d53f11671"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "5f9bd6839da4457466b9dd919cffc7c830659ec710411877"}], @NL80211_ATTR_MESH_ID={0xa}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/50) [ 504.548380] CPU: 1 PID: 19163 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 504.556302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.565673] Call Trace: [ 504.568458] dump_stack+0x1fc/0x2fe [ 504.573321] should_fail.cold+0xa/0x14 [ 504.577225] ? ksys_mount+0xcf/0x130 [ 504.580956] ? setup_fault_attr+0x200/0x200 [ 504.585896] ? blk_queue_enter+0x40b/0xb70 [ 504.590154] __should_failslab+0x115/0x180 [ 504.594392] should_failslab+0x5/0xf [ 504.598178] kmem_cache_alloc_node+0x54/0x3b0 [ 504.602686] create_task_io_context+0x2c/0x430 [ 504.607283] generic_make_request_checks+0x1c4f/0x22e0 [ 504.612561] ? should_fail_bio.isra.0+0xa0/0xa0 [ 504.617237] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 504.622394] ? kmem_cache_alloc+0x315/0x370 [ 504.626708] generic_make_request+0x23f/0xdf0 [ 504.631200] ? blk_put_request+0x110/0x110 [ 504.635880] submit_bio+0xb1/0x430 [ 504.639862] ? generic_make_request+0xdf0/0xdf0 [ 504.644531] ? check_preemption_disabled+0x41/0x280 [ 504.649543] ? guard_bio_eod+0x2a0/0x640 [ 504.654372] submit_bh_wbc+0x5a7/0x760 [ 504.658272] __bread_gfp+0x14e/0x300 [ 504.662001] ext4_fill_super+0x57b/0xc820 [ 504.666152] ? vsnprintf+0x2cc/0x14f0 [ 504.669940] ? pointer+0x850/0x850 [ 504.673464] ? lock_downgrade+0x720/0x720 [ 504.677597] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 504.682698] ? snprintf+0xbb/0xf0 [ 504.686141] ? vsprintf+0x30/0x30 [ 504.689581] ? wait_for_completion_io+0x10/0x10 [ 504.694242] ? set_blocksize+0x163/0x3f0 [ 504.698293] mount_bdev+0x2fc/0x3b0 [ 504.701908] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 504.707021] mount_fs+0xa3/0x30c [ 504.710902] vfs_kern_mount.part.0+0x68/0x470 [ 504.715384] do_mount+0x113c/0x2f10 [ 504.719008] ? do_raw_spin_unlock+0x171/0x230 [ 504.723520] ? check_preemption_disabled+0x41/0x280 [ 504.728530] ? copy_mount_string+0x40/0x40 [ 504.732751] ? copy_mount_options+0x59/0x380 [ 504.737145] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 504.742148] ? kmem_cache_alloc_trace+0x323/0x380 [ 504.746976] ? copy_mount_options+0x26f/0x380 [ 504.751456] ksys_mount+0xcf/0x130 [ 504.754986] __x64_sys_mount+0xba/0x150 [ 504.758991] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 504.763561] do_syscall_64+0xf9/0x620 [ 504.767349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.772529] RIP: 0033:0x46090a [ 504.775709] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 14:47:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xe000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639425cb4aed12f0000001500ae47a825d86800278dcff47d01005e6dbb8b810eba4600805acf4f9f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615627676f8f9fc0ebf8", 0x62}, {&(0x7f0000000600)="59e53cbeb5b83cb0ca999620004a15609c0874c1fefade80dc018241778c872d742f52ad7116209b846cf308478e37238e51407d1ca075630c9abad1e4122946a654bb29ceaad1d6d78dea3235a2089ef6b5d2605b4b68b61bc144a049d5a6005464459d7d47e30cf2d08decf5c64f4eadcb9606bdadadea6e9e595dd05e76a70d39813df90f4ad2b9f687c20f6beee17cb7701d7696d6260b2bdf96c1bb6c1033ebf302f295e5a47d4217c9e52261b8e5f2623dcf1c4354594f456549d8ed244c5092ba0ac863dda7456dc8fd93cdeb158012d87371146f7f02784914393442a9aebcfda3f67524fb5c4f08a042dd60e142aa85cfdb60f5bc3022a052268bd7a0fb2429ab4dd1fe728a7a8431fcb195447375eb6f1cd00051977df755dcf5654083a5820ae5c281781348e13692377df7b7525170ca63198e69c468283cf134c5f107537f84c6de42c1f6cd4286c20f8038a5b1db4a4dc276548c1aaf21ab3ed598554c563955a718299ad87078f6719fbbffa426b3ea5c144f0f22029f5befbf30cf080c1f039be66187492d7bd77b44c0678ccb64e304efd7e3527aff9555ebf569a389c1e66d788020d70085ecb5d5c630e022be3568ff66e35e7924b2db106cc1904d50fee9728eae36a3bb5a3cfcd75d4ee112e10a2a962cf6388f0208e9aa2fffc3a7b5091fa49e40b4c87c12ceb5a06b6a689a02038896e69c4670ba6720a7a8b62f025f4e1ed0c453855ca315dc8843b9099f19946f0a57c4b33ed78660d6135e44a37c96d79628dec2b0904cadeb8fa92062f986e3e12fe6fdb3e14d355486d45ee38f619e2b7a6ed298a728b02b29edd6b2fb852421361dada61bf4bdf65b6917fa175b0d748d65c48148464a5a544734b931a99a6a1164f7a56ba0f16870ba464e6ec8085757b13ac3e94100aeeca882831036a0336b5c57c17ed0ffe936379c3bba91d90a18f4839e8c0abd55c5eef278012fbc216aada68640191b63ae2806ca27398d52d825c8735fa6a7727e3efb3a6d88ccec7e951a6268757e15565d2be49a00b1593c6227707ec05ac7a5969acdc035ff3b5ffb21d8affec1b793014f0d17451a517c09fdfe56adca5e76c4f9845caf9483199c41a9a8f3a797930b1de6475f023707ea929e535799394a8472b3227f0e20aa6212045a3f09ab8e851e445d56d6eb8271c45e9423f8ba246235539fc0833e7da1f9a939a24cd9d676bed42585ffa95332cf43eb8f6aa8667739184baed804c96a5a2ac2cbeccd653909b63245f17ba1a49c749c22f342d93a1d5fddd88d718093a36e88db48532e716f60c6d12d6d75f21f6642b675b0c580845eb20f1ef4b93a9fc27324600aabff4399902ac99591e2a41825fc19bf8a611262df7749af557881b8339076af7e9e429621cf0f151afa6c95a628dd0be0bb4130d471e303d43bf87d5c742afd51677c07464155d73be5e8d6ae762fa2da5237b80d7e2979cba1bbd80fc26e5babc7c3e2f6eb5dcb27d5f67da68051f678a6ec2710de8cf97096ed9b88fe8699fcf1397cd3c61e4ed573de24d30fe07515f71f2148e5edbd87c9e27ec6b5cba070536594a2bd90489203fd9cbe162a9092df16d8699490576e0770a6c94b667d07aa1ab6ae234501e38c1aeb766fb67b76859b033d162621629f577dc2d2767917371dadc07b0407df522c4a963806724104236be5eaf3638b23983a5bffadd019dc7a9cbac083ac5a7ebbe708be7fb551e0b975432b95dbf989880fb817658a79d1b0812be7cfa0618f3b6af9333e6358002252cdc2037b7271bcea66a61214427cf7fbc2ad7cfcf757da84881acaefeb43e07d370362c084e26c29f0c9daddcae01c5ef29ad0029e93141a7fb734ec99a701316bc3d7dc6042385ef32595a853a48a8728c237c85c98076c5be2c52c2f96bffab1d2017d4af64c8d2394c7737765043767623769c685c7382c901441656ad8c2443641a9e4d3aca59066adbe9cb0c65d376ccb974200a6c4fe6384b0017a5e3d36bd44f063f591752a801b450195caf9591301a99326fdeca0ba8c9adc4c8abd6d44ba82a9d9fb65ece211dde800d948f1e59447965a6684cac5a8134753f5c64b92c44d16b5a87eb2f58be4ee5b97ebba35a7377f95fe2531ab5a3ec597308d5ab8584f3304fec44642876cd4c861e823fa30786e91d8fea1db57d795c6dba90ae0a2363697194da9e92476ef2fdd71a80098f4a329fa91250a88643fdd42fcd63b4a267a1f4c48aaf666b38bdb3e23007ad8f1d6ccd8df87d130756394d45ff90cc50c04541564e085e01794ab9e063c07aa3d6333cdfa035236a1c5ae1e11b591db020b815ed7fa9aecc009284cceada202697fdb515226e15c266488d7d63cc3653c2e2f9b2ec384fc81a23bf63103540b1963411a64840bf5303c20b612df46d0897275a5c4a26c5afcee41e12d7bfe8c4c85a676ba7b1772a4bcffd843dc813d024e070130cf3042afbe620aa4e99194a8da31a01fee697001698a5ed401e05609d6d613c0f7a8257176e345f1095ebf38a25f4f94fc4cb4c870f73347d3175dbb9c07cc34fe4fac70b41063956a8e8dfcb4f27e220c289e7656a8a4209c3ddc927e2c38b3a98a940235ef5e6de3a6dbabb5b68a467be959bfb3ad2d0be503f64b6393b73e859ae672f25b90960d7508bd63ded99d7eaa75cc5a7429d5099fc82f20cf5cbec3dd300082e20d10ac869379961f9cdd8e2f8785670b5ab891857e62abb73a4578bb89afcaef0fff99748bc2d4369bf71188b02b186236a70405d25610afcf3df84c7e6c9640581e7416b0960f3aaed254b6aec066c6032564bda87120314c062029d60e54825d10afa8197f02f4ccff9354e143291c9f40612e81f79d6ca6cb9f09ae71973383b8e8038ae930d4c3b47b844301bd01a0b336c3e068119dc43c770d2a9dc94a40252c675ef316038b96f9a663f4c4a9d6af282edca3b15c713017970d8cd2ee945e5643755b287c51695f03c95999667db8263cf50fb0b37ad08803552d8815955105157c64dc3c915919dc717b39ce059b77afab3f547d2c8286a22165fb38e5d1d6a2936b581b6181c84b426fddc4dee34bf6ac0e99e26847d4f5e21261a62e5b326a77552f8496c116a831ed449e4e090c5f808f16e99a7c7df19f45d7b66872afae43358adeaad3902fed441bb4520daf5019bb186d11a96c4176b7e9b395b1c76626274c718472e87c4f3a972b5999d415e448af9e238f838fd5837f1f4ea3956d48e539b8d02bd6953aea924d4563feb88dfc5fd6986520d58031439f2e1bb1c310650f87584053eab2e69ca28d1da66969acfb17335ac63b562156ce4ec040bdd7b6d5527b5f998899761631c2963fac4d4b323b3d491185753f3cdf578616e574976eff48771d3ccbc625bb5c686863d1196ba97090a8c64d268c9c636f2904ac6031d39f38ab2419780da059810fb234129790ce0a0c5c4d775f3c32c28927a261c52328e3302db596bf8fb1145e29b6dae8e7c21c5bfd1a2349d5345b7e141ce46eef871827f3bdfab9008c711177dd6305e69c6db1c02f702628c4fe9342c9b0dbb44b9fd8f3c6ddc2436b273746c8d2de86b7fc2e722c1929a72bf20d5fd7b87e4a96341734bbede5b5c752a967c3589408f6c9775501d02bea6cba79af4f9c360ea8ed1bce96e7f847c492d8593431975b8e786a2af90669f9b23dc5c0e96ca1c717c6aea87f7f3ef60fafefc1b574227b1e1b6848fa30aa9ae9aa9aca967d1ff5efb8cd54863341dd938e4af74e8535333bbf8547da951065e189d0c757e81cf7406a360bba12d0634b8c9e06a85ebca303b7cfb8b1eb66a2ffafc5840d5c8fe9fa2e0ed5b6e7dedcf558fe7f3653153ff4b1e6855a3dab55e0b72adb8d93177a40dcf9cd7953f14e70ac0b2a5471619a720dbb4858b9329ed26313a5e2367e666865b9f32f0d35050c0ff54051639343fb1f95bb062784f09e9e92ae9bf7567548cea45f5f70b878b038528eefeea219c71326b77992a44d287600ec9d4d373fdc86f9659a1c847ef81b0a936a680a47b7142e91857f9b8ef98cf9ff8181a31bce77f5b9649132c3928652aa08980bc4569b56842bff9f8c99a41c37a6ee2cf3a7f5b0a2338c7ef0fde86328c6f654b75a0f8e4e86cad26ff845515b5c5e0d8d748faa372e76379e8288f2397352004f5207a58c2d10e11e248b4a75bc7db138029d3f682fc71d28393f5b13d04098cd320cb38415f3c735630c3e7217a5525db711eeb24b7ff907be491bfbf5f93c880ae9a246f305ef55bd9ab0b78a864401d21d32d5c0655a8b20e21548b77ac64d7174c2066b8e4a67c7963698a11686bc262b4c4a51c6b63504fdc7488984de1991a3cbbe83a945edd32f4c6e725ddd2931ee06e4b2339331bf3aeede50a334d3ac8d4629d5c145487d8c5ed443451c55e79008f46f47c206b630d2c1d25f075a18fce921d38e395eb6a0e62a6387e2a1f96ecf127111b566de430ce0903bf723bd1e4bb2735e77eaab7797b3c5fd04fca476dd25367f119702d19f858cf3ba9c06deb9a33d986fe9db4848dba6141a171601af250c6c07f0cd134dffeadef9cf546be53a99da6206d3d309f290ef368785006039b856d05ac4ad038df84cd88e1d3c59c8475ce5da918e1072e411f07cf241f55c58c3683be25ca05815472948b9a1d5e3c12708593be66723a44763c07b7f4a78ee496b3fc0c5166debb7567a6d0db1a787fc1c97ed2ed955dca0fe1ff58a71441274f7b699de5aa0e0d4f74f37ed375e9ee5d26694d2dfd114cf099c38658076360ac6515873ccaf37d68818747d4b0f1cf33861a549de6eb929d55028bc5c49928b06ea96082ed61805a0aab51f2649a4165fdddddf2faa2ec77ad3a9b683e5cff7dd7006b50a011bcf45bc11d20863a4d10e0a23fbd120062f0f8813fb981e356f5b01702ef25174b2d870b26d85da24abf8a195e94af3ed17d2a0c5040d18c617ca5fef36fcd0e9e5a69197144fe7048ac6c99f150960eb05da4d1ec773873e7efa676283c884c5e461428398ce236d39e18cc72cd15cd6c6802be6f90a05abde4f419997f937633c1496cc2e04606bb57fce4bff382d123e140d8c5bc0fd278004dae1082ace4f1829090997d1654a01cab5504996e42725d6c96d6ac3f7c4f871f348a91a974bda1c7b11fb6ceb0581728ee88f0b6ec6be92af44c1c79dd5d3293c5f6c9267f3984267f3f37bdff2d878da19e377a134f52fd298bc04d87d38471e17ccbd804e629b2660f0df59a614405afd658a4e4738252c4d1ac777aa67d7c43af6bda3800e8a2785fc1d6bac6ecd11a2575855d85653d2de827ff7ecd912d7e4a2cada2fe43a8fbf11b680773e0276d686eac1cdede14b07743985671522c89a3e9b9553a6a1e02bd86bb01fae68d6b0ab5f6f98dffc774333bddb8f742aaf9f142bbc3bd096d496cc33a3df0de52315a3898a279ac49a972d68bcb63c10437c4f8d307aeacd3249e52407590c5b9669f27b0fdf3f951b4bfef42a28b23dad12f1a2ab2c506d8f6b424d841fcd52acd9afcdbfdeaf9b98fb5b735a3570c03353fefcf7251c3800bcf5684e9af16b176b38c26e08f1b837f265388e54ea8f12b9738457762b4566c0cf1aa2be4f9edbf1f79dd14f58ffd48ce16616646d6698cdc915c125cf5099a99829e36be2c87d0d196476cc555eb2e4e146aff6b358631ad12d705b780109f104cc240d4bb7f0b7144df8a2aab8e34543f6867854af082be188059112aaf31d0fd7", 0x1000}, {&(0x7f0000000100)="1f45c46c5ea2c5632eb5dbc3f6a0207bafd804a3fcd3217150aee5c90de2868815c098ea0819d30e715cd9a4e5fabbaa6dd45a1173726fcd2b5bafe6156c467c05af5885af79365438ebf9bc6c63865474bd1a327641f3418219b3192161640a3f04dae34e7972ac7b54887648f9636f0eeb43d3e7", 0x75}, {&(0x7f00000001c0)="4668c7ffbcdf10b43e0c338b2b0f363a2ac55c7df290cf9fcc4c209607118631fbc1cfc3ca82901f9fdf5b4f58ab7c4cf5b2d083c7df9a2f42e6840b8ee9ac6cd310cff8cd6b97d6fb4e28d938db80b87e955b7136feb6951f27eaa081570f0ebc52a660c038886f8e7246917261668a4b99c5f5dd4a5c5469cebc74949b5b3dd018d4249c9d9ab8afac6db530d03db63ff70de48782452e3a5a3b810fdeb04f8ab4b2f92fa30fed8c52305df9d52a75442f3164c0fabb9960fa6263c537fe0d9d306d90255d39bd20435b44d34060511932d0e86c7d826845a0eef31b031fd83563c4656d8c11ef2a246979a10f21f0b8c64c", 0xf3}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000480)="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", 0x111}], 0x9, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000000)={{0x2, 0x0, 0x79, 0x1, 0x7}, 0x2, 0xeb}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x9) [ 504.794945] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 504.802653] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 504.809911] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 504.818816] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 504.826109] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 504.833385] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 504.858793] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:06 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 504.979760] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 505.058507] FAULT_INJECTION: forcing a failure. [ 505.058507] name failslab, interval 1, probability 0, space 0, times 0 [ 505.070269] CPU: 0 PID: 19201 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 505.078171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.087523] Call Trace: [ 505.090137] dump_stack+0x1fc/0x2fe [ 505.093766] should_fail.cold+0xa/0x14 [ 505.097652] ? setup_fault_attr+0x200/0x200 [ 505.101954] ? mark_held_locks+0xf0/0xf0 [ 505.106000] ? is_bpf_text_address+0xfc/0x1b0 [ 505.110484] __should_failslab+0x115/0x180 [ 505.114702] should_failslab+0x5/0xf [ 505.118399] kmem_cache_alloc+0x3f/0x370 [ 505.122442] ? mempool_alloc+0x350/0x350 [ 505.126484] mempool_alloc+0x146/0x350 [ 505.130358] ? mempool_resize+0x790/0x790 [ 505.134489] ? check_preemption_disabled+0x41/0x280 [ 505.139504] ? find_get_entry+0x4f4/0x8a0 [ 505.143643] bio_alloc_bioset+0x389/0x5e0 [ 505.147798] ? __find_get_block+0x7a6/0xde0 [ 505.152125] ? bvec_alloc+0x2f0/0x2f0 [ 505.155911] ? lock_downgrade+0x720/0x720 [ 505.160048] submit_bh_wbc+0x141/0x760 [ 505.163934] ll_rw_block+0x1ed/0x220 [ 505.167664] __breadahead_gfp+0xb8/0x130 [ 505.171717] ? __breadahead+0x130/0x130 [ 505.175673] ? descriptor_loc+0x11d/0x390 [ 505.179805] ext4_fill_super+0x436b/0xc820 [ 505.184039] ? pointer+0x850/0x850 [ 505.187562] ? lock_downgrade+0x720/0x720 [ 505.191718] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 505.196821] ? snprintf+0xbb/0xf0 [ 505.200275] ? wait_for_completion_io+0x10/0x10 [ 505.204933] ? set_blocksize+0x163/0x3f0 [ 505.209014] mount_bdev+0x2fc/0x3b0 [ 505.212624] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 505.217710] mount_fs+0xa3/0x30c [ 505.221070] vfs_kern_mount.part.0+0x68/0x470 [ 505.225564] do_mount+0x113c/0x2f10 [ 505.229175] ? retint_kernel+0x2d/0x2d [ 505.233044] ? copy_mount_string+0x40/0x40 [ 505.237265] ? copy_mount_options+0x1f9/0x380 [ 505.241771] ? write_comp_data+0xf/0x70 [ 505.245741] ? copy_mount_options+0x26f/0x380 [ 505.250222] ksys_mount+0xcf/0x130 [ 505.253754] __x64_sys_mount+0xba/0x150 [ 505.257711] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 505.262291] do_syscall_64+0xf9/0x620 [ 505.266075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.271247] RIP: 0033:0x46090a [ 505.274422] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 505.293493] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 505.301186] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 505.308559] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 505.315812] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 505.323064] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 505.330319] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 505.354978] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6a", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) uselib(&(0x7f0000000000)='./file0\x00') lseek(r0, 0x0, 0x1) 14:47:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:08 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x53030000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs4\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x121000, 0x0) lseek(r0, 0x0, 0x1) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x7ff) [ 507.531979] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 507.584195] FAULT_INJECTION: forcing a failure. [ 507.584195] name failslab, interval 1, probability 0, space 0, times 0 [ 507.614978] CPU: 0 PID: 19225 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 507.622901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.632376] Call Trace: [ 507.635002] dump_stack+0x1fc/0x2fe [ 507.638664] should_fail.cold+0xa/0x14 [ 507.642565] ? setup_fault_attr+0x200/0x200 [ 507.646931] ? lock_acquire+0x170/0x3c0 [ 507.650927] __should_failslab+0x115/0x180 [ 507.655176] should_failslab+0x5/0xf [ 507.658899] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 507.664017] __kmalloc_node+0x38/0x70 [ 507.667826] kvmalloc_node+0x61/0xf0 [ 507.671546] ext4_fill_super+0x425d/0xc820 [ 507.675806] ? pointer+0x850/0x850 [ 507.679358] ? lock_downgrade+0x720/0x720 [ 507.683517] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 507.688630] ? snprintf+0xbb/0xf0 [ 507.692098] ? wait_for_completion_io+0x10/0x10 [ 507.696777] ? set_blocksize+0x163/0x3f0 [ 507.700852] mount_bdev+0x2fc/0x3b0 [ 507.704623] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 507.709739] mount_fs+0xa3/0x30c [ 507.713122] vfs_kern_mount.part.0+0x68/0x470 [ 507.717666] do_mount+0x113c/0x2f10 [ 507.721309] ? lock_acquire+0x170/0x3c0 [ 507.725293] ? check_preemption_disabled+0x41/0x280 [ 507.730346] ? copy_mount_string+0x40/0x40 [ 507.734595] ? copy_mount_options+0x59/0x380 [ 507.739011] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 507.744031] ? kmem_cache_alloc_trace+0x323/0x380 [ 507.749030] ? copy_mount_options+0x26f/0x380 [ 507.753525] ksys_mount+0xcf/0x130 [ 507.757069] __x64_sys_mount+0xba/0x150 [ 507.761045] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 507.765628] do_syscall_64+0xf9/0x620 [ 507.769435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.774609] RIP: 0033:0x46090a [ 507.777851] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 507.796750] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 507.804463] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 507.811729] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 507.818984] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 507.826349] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 14:47:09 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) lseek(r0, 0x0, 0x1) 14:47:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 507.833621] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 507.862850] EXT4-fs (loop3): not enough memory 14:47:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, &(0x7f0000000040)=""/95) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x3) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x4000000002000002) ptrace$setregs(0xd, r0, 0x2, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x501000, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7fff) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x60000000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:09 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 507.948380] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:47:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = geteuid() getresgid(&(0x7f0000002400), &(0x7f0000002440), &(0x7f0000002480)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002680)={0x0, 0x0}, &(0x7f00000026c0)=0xc) lstat(&(0x7f0000002700)='\x00', &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000002e00)='./file0\x00', 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000027c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@private0}}, &(0x7f00000028c0)=0xe8) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000002e40)={0x4, 0x7fffffff, 0x1}) r8 = getuid() r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setregid(r10, 0xee01) lstat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f00000001c0)="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", 0x2000, &(0x7f0000002d80)={&(0x7f0000000000)={0x50, 0x0, 0x47, {0x7, 0x20, 0x800, 0x81b100, 0x4, 0x0, 0x7, 0xe37}}, &(0x7f0000000080)={0x18, 0x0, 0xffffffffffffff01}, &(0x7f00000000c0)={0x18, 0x0, 0x8001, {0x3}}, &(0x7f0000000100)={0x18, 0x0, 0xfffffffffffffff7, {0x5}}, &(0x7f00000021c0)={0x18, 0x0, 0xce72, {0x7}}, &(0x7f0000002200)={0x28, 0x0, 0xffff, {{0x8001, 0x18000}}}, &(0x7f0000002240)={0x60, 0xffffffffffffffda, 0x7, {{0xffff, 0x1f, 0xf538, 0x630a, 0x0, 0x7d477b16, 0x0, 0x8}}}, &(0x7f00000022c0)={0x18, 0x0, 0x3, {0x2}}, &(0x7f0000002300)={0x12, 0xffffffffffffffda, 0x1f, {'*\x00'}}, &(0x7f0000002340)={0x20, 0x0, 0x4f84, {0x0, 0x5}}, &(0x7f0000002380)={0x78, 0xfffffffffffffffe, 0xe2, {0xfffffffffffffffa, 0x6, 0x0, {0x6, 0x351f, 0x5, 0x3f, 0x7, 0x3, 0x7fffffff, 0x1000, 0x0, 0xa000, 0xffffffd9, r2, 0x0, 0x0, 0x2}}}, &(0x7f00000024c0)={0x90, 0x0, 0x2, {0x1, 0x3, 0x3ff, 0x100000000, 0x902c, 0x8000, {0x4, 0x2, 0x7, 0x81, 0x6, 0x80000000, 0x3f, 0x0, 0x1f, 0xc000, 0x3, r3, r4, 0x1f, 0x9be}}}, &(0x7f0000002580)={0xe0, 0x0, 0x9, [{0x6, 0x900000000000000, 0x9, 0x2, 'configfs\x00'}, {0x2, 0x3ff, 0x4, 0x1000, '*.(G'}, {0x3, 0x100000001, 0x9, 0x10001, 'configfs\x00'}, {0x3, 0x8, 0x6, 0x5, '+)(.@%'}, {0x5, 0x5, 0x0, 0x1}, {0x1, 0x4, 0x9, 0x3, 'configfs\x00'}]}, &(0x7f0000002900)={0x2a0, 0x0, 0x1b, [{{0x4, 0x1, 0xffffffffffff8000, 0x2, 0x9634, 0x9, {0x0, 0x4, 0x3f, 0x7, 0x6, 0x400, 0x9f9, 0x101, 0xfff, 0xa000, 0x53, r5, r6, 0x2, 0x5}}, {0x3, 0x20, 0x9, 0x8, 'configfs\x00'}}, {{0x4, 0x3, 0x7, 0xffffffffffffffff, 0xa6, 0x7, {0x4, 0x739, 0xfffffffffffffff8, 0x10b94557, 0x1, 0x40, 0x200, 0x5, 0x101, 0x4000, 0x7ff, r7, 0xee01, 0x7fff, 0x9}}, {0x6, 0x5, 0x9, 0x77a1, 'configfs\x00'}}, {{0x2, 0x0, 0x3, 0x1, 0x3ff, 0x3, {0x0, 0x9, 0x5, 0x4, 0x4d00, 0x8, 0x5, 0x9, 0xdd, 0x1000, 0x6, r8, r10, 0x6, 0x2}}, {0x0, 0x800, 0x4, 0x1, '*+[\\'}}, {{0x6, 0x0, 0x800, 0x1, 0xff, 0x0, {0x4, 0x0, 0xffffffffffffffa8, 0x100, 0x40, 0x8001, 0xf7a, 0x20, 0x4, 0xa000, 0xfffffff7, 0x0, 0xee00, 0x20, 0x8}}, {0x5, 0x80, 0x7, 0x1ff, '!!\'!&-\xe4'}}]}, &(0x7f0000002c80)={0xa0, 0xfffffffffffffffe, 0x7fffffff, {{0x6, 0x0, 0x101, 0x6, 0x400, 0x5, {0x3, 0x10001, 0x3, 0x8, 0xc000000000, 0x7fff, 0x2, 0x0, 0x5, 0x2000, 0x80000000, r11, 0xffffffffffffffff, 0x5}}, {0x0, 0x9}}}, &(0x7f0000002d40)={0x20, 0x0, 0x3, {0x1, 0x4, 0xcba, 0x6}}}) lseek(r0, 0x0, 0x1) [ 508.024873] FAULT_INJECTION: forcing a failure. [ 508.024873] name failslab, interval 1, probability 0, space 0, times 0 [ 508.050385] CPU: 1 PID: 19260 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 508.058308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.067670] Call Trace: [ 508.070620] dump_stack+0x1fc/0x2fe [ 508.074272] should_fail.cold+0xa/0x14 [ 508.078171] ? setup_fault_attr+0x200/0x200 [ 508.082542] ? lock_acquire+0x170/0x3c0 [ 508.086542] __should_failslab+0x115/0x180 [ 508.090794] should_failslab+0x5/0xf [ 508.094517] kmem_cache_alloc_trace+0x284/0x380 [ 508.099202] mb_cache_create+0x4f/0x4c0 [ 508.103199] ext4_fill_super+0x97b1/0xc820 [ 508.107480] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 508.112597] ? snprintf+0xbb/0xf0 [ 508.116066] ? wait_for_completion_io+0x10/0x10 [ 508.120744] ? set_blocksize+0x163/0x3f0 [ 508.124826] mount_bdev+0x2fc/0x3b0 [ 508.129079] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 508.134189] mount_fs+0xa3/0x30c [ 508.137578] vfs_kern_mount.part.0+0x68/0x470 [ 508.142092] do_mount+0x113c/0x2f10 [ 508.145734] ? do_raw_spin_unlock+0x171/0x230 [ 508.150254] ? check_preemption_disabled+0x41/0x280 [ 508.155286] ? copy_mount_string+0x40/0x40 [ 508.159541] ? copy_mount_options+0x59/0x380 [ 508.163972] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 508.169191] ? kmem_cache_alloc_trace+0x323/0x380 [ 508.174022] ? copy_mount_options+0x26f/0x380 [ 508.178506] ksys_mount+0xcf/0x130 [ 508.182047] __x64_sys_mount+0xba/0x150 [ 508.186013] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 508.190606] do_syscall_64+0xf9/0x620 [ 508.194393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.199602] RIP: 0033:0x46090a [ 508.203031] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 508.222079] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 508.229774] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 508.237039] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 508.244307] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 508.251570] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 508.258822] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 508.270488] EXT4-fs (loop3): Failed to create ea_block_cache 14:47:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6a", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x80ffffff, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000000)=0x8000) 14:47:11 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x9effffff, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 510.590874] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 510.591497] FAULT_INJECTION: forcing a failure. [ 510.591497] name failslab, interval 1, probability 0, space 0, times 0 14:47:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xf0ffffff, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 510.635319] CPU: 0 PID: 19291 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 510.643247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.652606] Call Trace: [ 510.655208] dump_stack+0x1fc/0x2fe [ 510.658851] should_fail.cold+0xa/0x14 [ 510.662750] ? setup_fault_attr+0x200/0x200 [ 510.667086] ? lock_acquire+0x170/0x3c0 [ 510.671280] __should_failslab+0x115/0x180 [ 510.675523] should_failslab+0x5/0xf [ 510.679241] __kmalloc+0x2ab/0x3c0 [ 510.682801] ? mb_cache_create+0x155/0x4c0 [ 510.687026] mb_cache_create+0x155/0x4c0 [ 510.691080] ext4_fill_super+0x97b1/0xc820 [ 510.695346] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 510.700437] ? snprintf+0xbb/0xf0 [ 510.703878] ? wait_for_completion_io+0x10/0x10 [ 510.708532] ? set_blocksize+0x163/0x3f0 [ 510.712580] mount_bdev+0x2fc/0x3b0 [ 510.716205] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 510.721298] mount_fs+0xa3/0x30c [ 510.724656] vfs_kern_mount.part.0+0x68/0x470 [ 510.729146] do_mount+0x113c/0x2f10 [ 510.732767] ? lock_acquire+0x170/0x3c0 [ 510.736725] ? check_preemption_disabled+0x41/0x280 [ 510.741729] ? copy_mount_string+0x40/0x40 [ 510.745957] ? copy_mount_options+0x59/0x380 [ 510.750357] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 510.755386] ? kmem_cache_alloc_trace+0x323/0x380 [ 510.760239] ? copy_mount_options+0x26f/0x380 [ 510.764734] ksys_mount+0xcf/0x130 [ 510.768361] __x64_sys_mount+0xba/0x150 [ 510.772331] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 510.776918] do_syscall_64+0xf9/0x620 [ 510.780724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.785899] RIP: 0033:0x46090a [ 510.789089] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 510.807991] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 510.815708] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 510.822995] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 14:47:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) chdir(&(0x7f0000000000)='./file0\x00') [ 510.830262] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 510.837527] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 510.844782] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 510.856181] EXT4-fs (loop3): Failed to create ea_block_cache 14:47:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x80000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x64002, 0x7) lseek(r0, 0x0, 0x1) 14:47:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c65720000000000", 0x86, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:12 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xfffff000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 511.032338] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 511.043270] FAULT_INJECTION: forcing a failure. [ 511.043270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 511.055640] CPU: 0 PID: 19320 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 511.063560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.072919] Call Trace: [ 511.075519] dump_stack+0x1fc/0x2fe [ 511.079164] should_fail.cold+0xa/0x14 [ 511.083065] ? setup_fault_attr+0x200/0x200 [ 511.087496] __alloc_pages_nodemask+0x239/0x2890 [ 511.092267] ? kasan_kmalloc+0x139/0x160 [ 511.096337] ? mark_held_locks+0xf0/0xf0 [ 511.100406] ? do_syscall_64+0xf9/0x620 [ 511.104388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.109762] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 511.114623] ? mark_held_locks+0xf0/0xf0 [ 511.118696] ? __debug_object_init+0x410/0x9b0 [ 511.124160] ? mark_held_locks+0xa6/0xf0 [ 511.128262] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 511.133369] alloc_pages_current+0x193/0x2a0 [ 511.137769] ? __debug_object_init+0x410/0x9b0 [ 511.142349] get_zeroed_page+0x10/0x40 [ 511.146232] ext4_calculate_overhead+0xfb/0x11c0 [ 511.150988] ext4_fill_super+0x9681/0xc820 [ 511.155309] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 511.160398] ? snprintf+0xbb/0xf0 [ 511.163854] ? wait_for_completion_io+0x10/0x10 [ 511.168516] ? set_blocksize+0x163/0x3f0 [ 511.172582] mount_bdev+0x2fc/0x3b0 [ 511.176215] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 511.181333] mount_fs+0xa3/0x30c [ 511.184720] vfs_kern_mount.part.0+0x68/0x470 [ 511.189232] do_mount+0x113c/0x2f10 [ 511.192873] ? lock_acquire+0x170/0x3c0 [ 511.196843] ? check_preemption_disabled+0x41/0x280 [ 511.201851] ? copy_mount_string+0x40/0x40 [ 511.206083] ? copy_mount_options+0x59/0x380 [ 511.210503] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 511.215963] ? kmem_cache_alloc_trace+0x323/0x380 [ 511.220797] ? copy_mount_options+0x26f/0x380 [ 511.225279] ksys_mount+0xcf/0x130 [ 511.228807] __x64_sys_mount+0xba/0x150 [ 511.232778] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 511.237351] do_syscall_64+0xf9/0x620 [ 511.241264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.246467] RIP: 0033:0x46090a [ 511.249646] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 511.268898] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 511.276609] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 511.284221] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 511.291475] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 511.298729] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 511.305991] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f", 0x55}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xffffff7f, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002140)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = inotify_init1(0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r4 = socket$l2tp6(0xa, 0x2, 0x73) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002540)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast1}}, &(0x7f0000002640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002680)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002780)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002840)=[{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000100)="c2bb115fe14a642445f7d685e6daaa6aeadbc804ef782f84621dcbc5effc5dc1446afcdc0cc1874c3d9fd2293c7e0e1a5501f81eb64d2c36c5730cceb6ac243320cf38c22d414ff52508939b42d4c9231057715c9fc5bf8595d14c1d69f33ea0562103f3310820308a52b71bf816904b996d6312a6099063d3ea5ba80282995941d5cf5645604c85d19d82b3b8ebf8f5cca925d451b8aa4df2f91f23ed11548c88f529f8c2295b1b4a79a5125e2c6578b758e2778e71705f0a6981", 0xbb}], 0x1, &(0x7f0000000480)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0, 0x804}, {&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000540)="fd36a85b921d610aa27bafbd45dab92714488dc3be1c88da2f99269791460286a939c9db", 0x24}, {&(0x7f0000000580)="24a8ea35ab1c89e8a2fa3e9403e1fed5", 0x10}, {&(0x7f00000005c0)="7eed439a2e67257e40b9e9676f9b18a5862dec18aed64d9dde91bc673223e889fc31a2241584b83e81114a2c6cadb92381e5130b290ffb8b7e8159dac25f4b6d3635687547a3dea12830eda1f1d65af6a76acfede2", 0x55}], 0x3, &(0x7f0000000cc0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128, 0x4008000}, {&(0x7f0000000e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000000e80)="5cc94d75e1028c052dfe42760496c3", 0xf}, {&(0x7f0000000ec0)="2357a2a981310c4c6569a53901aa1781b5dba31bae4a575230287d43464709e4e744228f76067216abd6a17f1b99be0d0d37ff730c7c456b2d5c9075e6e352c5e3100645d691bb63f782b89a34e93b6f7919df1f807e936870a252ea3dd9dc4cf43f1b30a5996dc8e195e7dfac233429c34c0d8937188c0e53fc55dd95e0e6db1203749d07d402c351d74b7a9d21c747520862300e8f91a2b6878e06c444f037c0c07ec09e3b2855aa843f7da64fe1e48828", 0xb2}, {&(0x7f0000000f80)="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", 0x1000}, {&(0x7f0000001f80)="08541ad0cd7b474cdb89473fabf86fe4e1604e9089ade8cced7908eb4666e364da43428d144b91e3484b75f9e22e3b1168d81031d45fda2b74c6c38a6e", 0x3d}], 0x4, &(0x7f0000002180)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4, r5]}}], 0xd0, 0x20008094}, {&(0x7f0000002280)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002500)=[{&(0x7f0000002300)="f95af1e4e1b8b3f749172f4161d63ff0a4805ea75bd8760682fa610712ebfb49343c7c6c29a88098e4d513e30779963f2354b1169a5da0b35087faa9d66e958051db1390283ad0d1193dc3304d1dfdd945b6ec0fb4475e44661087b5b7362169d1de44a43ea3916868d303cfc785938c0b1b72dff498c572dd531ce7680ca0f5191bc5e67167df4617d9849713b21483a0057422f90348b28298a27b67777720624e6d9af823f0dafe7d4632ec252ab1c6f181f74642b667dc293b4ffcf4642a32922b41", 0xc4}, {&(0x7f0000002400)="368cea8a2c8e39c04c794765bf5ec1d655127622791fc20312219a05333548665d0aba4560945678b11a6a3fb3ef75dadac12efbbd97c317ebe4c3c39c4c3bb0b77a51ff34bda5691695461aef5cefbc6ce6aad9424dec", 0x57}, {&(0x7f0000002480)="f60137b48f6ddc1fa1c45fb1d1f8d6ab573d6d4edd7673fd2271808227c494ca79ebd610b599d7bb6d8aaf428b8628b7c79f08d8a4bab7f6245c4cef0ff1e4e5919a67bb6c48e0cb2fd636bfa9afd5fe0ca3a4ce6284d50d255254e1e689980a794c7b90e9d51cc7fe1024bfc848f40475f95397", 0x74}], 0x3, &(0x7f00000027c0)=[@cred={{0x1c, 0x1, 0x2, {r0, r6, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, r7, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x60, 0x8000}], 0x4, 0x100c0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:14 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x38, 0x1, 0x2, 0x5, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}]}, 0x38}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x9, 0x61eb469a6f4f449a, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4084) 14:47:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:14 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 513.648976] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 513.659030] FAULT_INJECTION: forcing a failure. [ 513.659030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.670849] CPU: 1 PID: 19344 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 513.678736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.688096] Call Trace: [ 513.690701] dump_stack+0x1fc/0x2fe [ 513.694347] should_fail.cold+0xa/0x14 [ 513.698288] ? setup_fault_attr+0x200/0x200 [ 513.702623] ? is_bpf_text_address+0xfc/0x1b0 [ 513.707132] ? kernel_text_address+0xbd/0xf0 [ 513.711551] __alloc_pages_nodemask+0x239/0x2890 [ 513.716321] ? __lock_acquire+0x6de/0x3ff0 [ 513.720561] ? mb_cache_create+0x4f/0x4c0 [ 513.724715] ? ext4_fill_super+0x97b1/0xc820 [ 513.729132] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 513.733982] ? do_mount+0x113c/0x2f10 [ 513.737799] ? ksys_mount+0xcf/0x130 [ 513.741607] ? __x64_sys_mount+0xba/0x150 [ 513.745760] ? do_syscall_64+0xf9/0x620 [ 513.749743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.755119] ? mark_held_locks+0xa6/0xf0 [ 513.759184] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 513.764279] ? should_fail+0x142/0x7b0 [ 513.768173] cache_grow_begin+0xa4/0x8a0 [ 513.772220] ? setup_fault_attr+0x200/0x200 [ 513.776543] ? lock_acquire+0x170/0x3c0 [ 513.780627] cache_alloc_refill+0x273/0x340 [ 513.784962] __kmalloc+0x362/0x3c0 [ 513.788495] ? mb_cache_create+0x155/0x4c0 [ 513.792738] mb_cache_create+0x155/0x4c0 [ 513.796886] ext4_fill_super+0x97b1/0xc820 [ 513.801156] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 513.806538] ? snprintf+0xbb/0xf0 [ 513.809988] ? wait_for_completion_io+0x10/0x10 [ 513.814644] ? set_blocksize+0x163/0x3f0 [ 513.818695] mount_bdev+0x2fc/0x3b0 [ 513.822313] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 513.827402] mount_fs+0xa3/0x30c [ 513.830761] vfs_kern_mount.part.0+0x68/0x470 [ 513.835244] do_mount+0x113c/0x2f10 [ 513.838872] ? lock_acquire+0x170/0x3c0 [ 513.842835] ? check_preemption_disabled+0x41/0x280 [ 513.847839] ? copy_mount_string+0x40/0x40 [ 513.852059] ? copy_mount_options+0x59/0x380 [ 513.856474] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 513.861489] ? kmem_cache_alloc_trace+0x323/0x380 [ 513.866323] ? copy_mount_options+0x26f/0x380 [ 513.870817] ksys_mount+0xcf/0x130 [ 513.874343] __x64_sys_mount+0xba/0x150 [ 513.878304] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 513.882873] do_syscall_64+0xf9/0x620 [ 513.886671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.891843] RIP: 0033:0x46090a [ 513.895020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.913902] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 513.921604] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 513.928862] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 513.936375] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 14:47:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) sendto$llc(r1, &(0x7f0000000000)="5781dcc00e5527301703ac1a2140af3d8eae6261c084ad7fe47cbcd4c36019dc29d3183f0438b02d79281748d2d1e9997fb01143ed2f80b9f37cd7f0aeb40c949be6e2339406893d3a8c2fcf757f6af78594a1239543efaf236fdc04db86fbdefff214ea11c9afa56e6937dc8015469e043010b60fb9ed4329851c303f51487248b38e239d6a719b6e65be1f9a7fcdd7a5b01197eeb80216cac84f32dc0814b6d0777f6555ecae0700aa36e1290ec70dfa0d6208de3b3f72cdb9a27fc1e0d112cb655eb3ab5f0cbdc501bdf701ac74499c3751b4a771467229d88415c68a", 0xde, 0x4000000, &(0x7f0000000100)={0x1a, 0x20, 0x9, 0x6, 0x7, 0x1, @link_local}, 0x10) 14:47:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500"/201, 0xc9, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xffffff80, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 513.943629] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 513.950886] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xffffff9e, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:15 executing program 1: mkdir(&(0x7f0000000000)='./file0/../file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r0, 0x10, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x77}}}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) [ 514.047461] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue [ 514.197316] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:47:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f", 0x55}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:18 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xfffffff0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x48) unlink(&(0x7f0000000040)='./file0\x00') lseek(r0, 0xffffffffffffffff, 0x1) 14:47:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x280003) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000100)={0x1, @sdr={0x34343459, 0x6}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x4, 0x42, 0x4, 0x6, 0x40, @local, @mcast1, 0x700, 0x10, 0x1, 0x52}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000040)={0x2, 0x3}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vim2m\x00', 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) getpgid(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f00000002c0)={0xf}) 14:47:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ufs\x00', 0x81000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x125000, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x100000000) lseek(r0, 0x0, 0x1) [ 516.679471] FAULT_INJECTION: forcing a failure. [ 516.679471] name failslab, interval 1, probability 0, space 0, times 0 [ 516.699416] CPU: 0 PID: 19395 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 516.707326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.716686] Call Trace: [ 516.719287] dump_stack+0x1fc/0x2fe [ 516.722929] should_fail.cold+0xa/0x14 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0xffffffff, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 516.726829] ? setup_fault_attr+0x200/0x200 [ 516.731160] ? lock_acquire+0x170/0x3c0 [ 516.735152] __should_failslab+0x115/0x180 [ 516.739398] should_failslab+0x5/0xf [ 516.743118] __kmalloc+0x2ab/0x3c0 [ 516.746772] ? __alloc_workqueue_key+0x789/0xed0 [ 516.751550] __alloc_workqueue_key+0x789/0xed0 [ 516.756243] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 516.760864] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 516.765898] ext4_fill_super+0x6edb/0xc820 [ 516.770201] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 516.775319] ? snprintf+0xbb/0xf0 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 516.778827] ? wait_for_completion_io+0x10/0x10 [ 516.783509] ? set_blocksize+0x163/0x3f0 [ 516.787591] mount_bdev+0x2fc/0x3b0 [ 516.791267] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 516.796383] mount_fs+0xa3/0x30c [ 516.799783] vfs_kern_mount.part.0+0x68/0x470 [ 516.804295] do_mount+0x113c/0x2f10 [ 516.807932] ? retint_kernel+0x2d/0x2d [ 516.811829] ? copy_mount_string+0x40/0x40 [ 516.816077] ? copy_mount_options+0x190/0x380 [ 516.820581] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 516.825434] ? copy_mount_options+0x26f/0x380 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 516.830025] ksys_mount+0xcf/0x130 [ 516.833577] __x64_sys_mount+0xba/0x150 [ 516.837552] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 516.842137] do_syscall_64+0xf9/0x620 [ 516.845951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.851139] RIP: 0033:0x46090a [ 516.854336] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x3, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 516.873242] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 516.881000] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 516.888639] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 516.896137] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 516.904138] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 516.911405] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 516.925404] EXT4-fs: failed to create workqueue 14:47:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f", 0x55}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:18 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 516.930099] EXT4-fs (loop3): mount failed [ 516.936801] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x4, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x11, r0, 0xfffffffffffffffb) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:47:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x7, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 517.076864] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 517.087098] FAULT_INJECTION: forcing a failure. [ 517.087098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 517.115001] CPU: 1 PID: 19440 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 517.122912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.132276] Call Trace: [ 517.134861] dump_stack+0x1fc/0x2fe [ 517.138514] should_fail.cold+0xa/0x14 [ 517.142393] ? setup_fault_attr+0x200/0x200 [ 517.146724] __alloc_pages_nodemask+0x239/0x2890 [ 517.151483] ? kasan_kmalloc+0x139/0x160 [ 517.155793] ? mark_held_locks+0xf0/0xf0 [ 517.159840] ? do_syscall_64+0xf9/0x620 [ 517.163800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.169155] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 517.174077] ? mark_held_locks+0xf0/0xf0 [ 517.178124] ? __debug_object_init+0x410/0x9b0 [ 517.182695] ? mark_held_locks+0xa6/0xf0 [ 517.186753] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 517.191859] alloc_pages_current+0x193/0x2a0 [ 517.196251] ? __debug_object_init+0x410/0x9b0 [ 517.200824] get_zeroed_page+0x10/0x40 [ 517.204698] ext4_calculate_overhead+0xfb/0x11c0 [ 517.209623] ext4_fill_super+0x9681/0xc820 [ 517.213860] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 517.218950] ? snprintf+0xbb/0xf0 [ 517.222396] ? wait_for_completion_io+0x10/0x10 [ 517.227057] ? set_blocksize+0x163/0x3f0 [ 517.231198] mount_bdev+0x2fc/0x3b0 [ 517.234819] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 517.239925] mount_fs+0xa3/0x30c [ 517.243282] vfs_kern_mount.part.0+0x68/0x470 [ 517.247777] do_mount+0x113c/0x2f10 [ 517.251391] ? lock_acquire+0x170/0x3c0 [ 517.255356] ? check_preemption_disabled+0x41/0x280 [ 517.260358] ? copy_mount_string+0x40/0x40 [ 517.264582] ? copy_mount_options+0x59/0x380 [ 517.268981] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 517.273986] ? kmem_cache_alloc_trace+0x323/0x380 [ 517.278817] ? copy_mount_options+0x26f/0x380 [ 517.283303] ksys_mount+0xcf/0x130 [ 517.286835] __x64_sys_mount+0xba/0x150 [ 517.290796] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 517.295367] do_syscall_64+0xf9/0x620 [ 517.299158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.304356] RIP: 0033:0x46090a [ 517.307536] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.326422] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 517.334117] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 517.341374] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 517.348645] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 517.355920] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 517.363196] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getsockname$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x20) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x8, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:47:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33383636333430383500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/235, 0xeb, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:21 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:21 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 519.705681] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 519.725655] FAULT_INJECTION: forcing a failure. [ 519.725655] name failslab, interval 1, probability 0, space 0, times 0 [ 519.784509] CPU: 0 PID: 19466 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 519.792436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.801809] Call Trace: [ 519.804430] dump_stack+0x1fc/0x2fe [ 519.808074] should_fail.cold+0xa/0x14 [ 519.811975] ? setup_fault_attr+0x200/0x200 [ 519.816304] ? lock_acquire+0x170/0x3c0 [ 519.820304] __should_failslab+0x115/0x180 [ 519.824537] should_failslab+0x5/0xf [ 519.828398] __kmalloc+0x2ab/0x3c0 [ 519.831942] ? __alloc_workqueue_key+0x789/0xed0 [ 519.836787] __alloc_workqueue_key+0x789/0xed0 [ 519.841358] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 519.846023] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 519.851056] ext4_fill_super+0x6edb/0xc820 [ 519.855517] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 519.860618] ? snprintf+0xbb/0xf0 [ 519.864088] ? wait_for_completion_io+0x10/0x10 [ 519.868859] ? set_blocksize+0x163/0x3f0 [ 519.872966] mount_bdev+0x2fc/0x3b0 [ 519.876667] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 519.881775] mount_fs+0xa3/0x30c [ 519.885153] vfs_kern_mount.part.0+0x68/0x470 [ 519.889649] do_mount+0x113c/0x2f10 [ 519.893274] ? lock_acquire+0x170/0x3c0 [ 519.897243] ? check_preemption_disabled+0x41/0x280 [ 519.902679] ? copy_mount_string+0x40/0x40 [ 519.906953] ? copy_mount_options+0x59/0x380 [ 519.911361] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 519.916425] ? kmem_cache_alloc_trace+0x323/0x380 [ 519.921258] ? copy_mount_options+0x26f/0x380 [ 519.925813] ksys_mount+0xcf/0x130 [ 519.929348] __x64_sys_mount+0xba/0x150 14:47:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000ac0)='./file0\x00', &(0x7f0000003240)=[&(0x7f0000002800)=']\x00', &(0x7f00000030c0)='configfs\x00', &(0x7f0000003100)=',:\x00', &(0x7f0000003140)='\x00', &(0x7f0000003180)='configfs\x00', &(0x7f00000031c0)='configfs\x00', &(0x7f0000003200)='&(^{\x00'], &(0x7f0000003440)=[&(0x7f0000003280)='configfs\x00', &(0x7f00000032c0)='-/K[^+.:&$\x00', &(0x7f0000003300)='configfs\x00', &(0x7f0000003340)='${.\x00', &(0x7f0000003380)='configfs\x00', &(0x7f00000033c0)='\x00', &(0x7f0000003400)='configfs\x00'], 0x100) lseek(r0, 0x0, 0x1) clock_gettime(0x0, &(0x7f0000003040)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002e40)=[{{&(0x7f0000000000)=@ax25={{0x3, @default}, [@remote, @null, @bcast, @null, @bcast, @null, @bcast]}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/88, 0x58}, {&(0x7f0000000100)=""/34, 0x22}, {&(0x7f00000001c0)=""/52, 0x34}], 0x3, &(0x7f0000000240)=""/101, 0x65}, 0x8}, {{&(0x7f00000002c0)=@isdn, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/190, 0xbe}, {&(0x7f0000000500)=""/230, 0xe6}, {&(0x7f0000000600)=""/245, 0xf5}], 0x4, &(0x7f0000000740)=""/108, 0x6c}, 0x5}, {{&(0x7f00000007c0)=@isdn, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000000940)=""/212, 0xd4}, {&(0x7f0000000a40)=""/92, 0x5c}, {&(0x7f0000000ac0)}, {&(0x7f0000000b00)=""/151, 0x97}], 0x7}, 0x59a}, {{&(0x7f0000000c40)=@l2, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000cc0)=""/4096, 0x1000}], 0x1, &(0x7f0000001d00)=""/252, 0xfc}, 0x5}, {{&(0x7f0000001e00)=@pppol2tpin6, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e80)=""/152, 0x98}, {&(0x7f0000001f40)=""/40, 0x28}], 0x2, &(0x7f0000001fc0)=""/190, 0xbe}, 0x8}, {{&(0x7f0000002080)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002100)=""/54, 0x36}, {&(0x7f0000002140)=""/214, 0xd6}, {&(0x7f0000002240)=""/198, 0xc6}, {&(0x7f0000002340)=""/37, 0x25}, {&(0x7f0000002380)=""/174, 0xae}, {&(0x7f0000002440)=""/61, 0x3d}, {&(0x7f0000002480)=""/157, 0x9d}, {&(0x7f0000002540)=""/137, 0x89}, {&(0x7f0000002600)=""/50, 0x32}], 0x9, &(0x7f0000002700)=""/65, 0x41}, 0x9}, {{&(0x7f0000002780)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000003480)}, {&(0x7f0000002840)=""/119, 0x77}, {&(0x7f00000028c0)=""/110, 0x6e}, {&(0x7f0000002940)=""/103, 0x67}], 0x4}, 0x1}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000002a00)=""/77, 0x4d}, {&(0x7f0000002a80)=""/57, 0x39}, {&(0x7f0000002ac0)=""/240, 0xf0}, {&(0x7f0000002bc0)=""/102, 0x66}, {&(0x7f0000002c40)=""/118, 0x76}, {&(0x7f0000002cc0)=""/160, 0xa0}], 0x6, &(0x7f0000002e00)=""/48, 0x30}, 0x5}], 0x8, 0x400001c1, &(0x7f0000003080)={r1, r2+60000000}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003480)={0x0}, &(0x7f00000034c0)=0xc) ptrace$setopts(0x4200, r3, 0xfffffffffffffbff, 0x5) [ 519.933770] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 519.938353] do_syscall_64+0xf9/0x620 [ 519.942141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.947336] RIP: 0033:0x46090a [ 519.950513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 519.969629] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 519.977352] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a 14:47:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xe, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 519.984627] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 519.991898] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 519.999165] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 520.006623] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 520.020123] EXT4-fs: failed to create workqueue [ 520.035556] EXT4-fs (loop3): mount failed 14:47:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x6, &(0x7f0000001480)=[{&(0x7f00000001c0)="ea3c193a33f0405072696ec5070a093bc0c512170d935d200887b274199433bf6d5350b5da8670177abf124112e64235c2a4c62a2a2054e01a0db8c94c8a72a582dea88fed8489bf946f306b1d7cc7f858c31065a4999c85df9ffe86fc9eff9eaf30d106f7625a95b9299156e838dc9e6421c3ded10f2168d864314e9cb39ad12e9b8fe3acb53daf4ddaf5d6d6ab0ae088641901827d3316551fe0415a46f6a6f775b33d51befee785457b58a930fff33dcd8295fbe204575c49a4858ca1b1b53792ec8d8b5d31d83424ba216191acf91e8253e9b9", 0xd5, 0xffff}, {&(0x7f00000002c0)="61ad09ea404d7be224777b578cc7754d7cb954945cb663373bba9e03523682213e725d4f3385d78debffe29d3ee0ab29051df41df6d1c27589ae4c606f88e13501bbc0709b1ed8c40bfc107776bddbbf9acd2986b762b7ab321056c7bd7a7b79f232812a0abdc8a14c5281d4c0b3f93e8267d3ee737e2221d900dea3a8f870319974c4b0d7242682a77ec8236341c7c33a60073abdc09d58614ef10c210c4620464f5573ecfa4ea83f79545088963185bf0225141b0ece0c24bc71b42e28a2bf683b20630248", 0xc6, 0x7}, {&(0x7f0000000080)="6dd3b689f59b04004592b7f188c2d107b9a513fcd221cca610bed7d3a86ce273207a041cb423b8fd6daa7837a699c6574c3fd87ccfac003ff347305007616962b630e893b2f4dce512b20097204db50d04955166ed73e77fd5bbe6abfa02966bf2cbbfc17ef9a5dd58be89f4cf308e0452299f9214d864502255d274ca7a3e428e34779cb9e573531827279e0c251a918c35f560e73ed460de6fa7df00ae29730d1b27664841e9f5", 0xa8, 0x3ff}, {&(0x7f00000003c0)="2fb2136ca3ec28a76e62724b6a4c69af027a6c5a39d7c8e5b883a3b0067b987cd6fa83a8b357ef98460d6fdc0e034e34f2885508f41b9e171ba28859860d19d420a42b42e1cda3099257cbb92ca2204ba569b7c0fe30c9a7e194110a01f4d3a50bd25438256c0bf7a7ed4cabb15327f0f281b260f3e4aa7720e03fac", 0x7c, 0x6}, {&(0x7f0000000440)="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", 0x1000, 0x255}, {&(0x7f0000001440)="adc652a8147cc2f4fa835553b3395dab29831e97687a720bf3bf027b9525e27b027059f6faef70b685f266ebf73fde77adb8f274428f2d210c507ab69e4b", 0x3e, 0xf8}], 0x1020000, &(0x7f0000001540)={[{'configfs\x00'}, {'configfs\x00'}, {']'}], [{@measure='measure'}, {@fowner_gt={'fowner>', 0xee01}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\-^+#}#\'.^^\\\'@\\'}}, {@obj_user={'obj_user', 0x3d, '('}}, {@hash='hash'}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) ioctl$SIOCPNGETOBJECT(0xffffffffffffffff, 0x89e0, &(0x7f0000001600)=0x8) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x160) [ 520.127270] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:47:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x511000, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000000000fe0b0005060000000000000500"/40]) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:24 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x60, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x10402, 0x6) lseek(r0, 0x0, 0x1) 14:47:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 522.764800] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 522.799620] FAULT_INJECTION: forcing a failure. [ 522.799620] name failslab, interval 1, probability 0, space 0, times 0 [ 522.841329] CPU: 1 PID: 19528 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 522.849238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.858597] Call Trace: [ 522.861197] dump_stack+0x1fc/0x2fe [ 522.864824] should_fail.cold+0xa/0x14 [ 522.868701] ? setup_fault_attr+0x200/0x200 [ 522.873009] ? lock_acquire+0x170/0x3c0 [ 522.877059] __should_failslab+0x115/0x180 [ 522.881450] should_failslab+0x5/0xf [ 522.885300] kmem_cache_alloc_trace+0x284/0x380 [ 522.889973] __alloc_workqueue_key+0x7de/0xed0 [ 522.894557] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 522.899132] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 522.904161] ext4_fill_super+0x6edb/0xc820 [ 522.908401] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 522.913496] ? snprintf+0xbb/0xf0 [ 522.916951] ? wait_for_completion_io+0x10/0x10 [ 522.921610] ? set_blocksize+0x163/0x3f0 [ 522.926399] mount_bdev+0x2fc/0x3b0 [ 522.930187] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 522.935277] mount_fs+0xa3/0x30c [ 522.938630] vfs_kern_mount.part.0+0x68/0x470 [ 522.943124] do_mount+0x113c/0x2f10 [ 522.946739] ? lock_acquire+0x170/0x3c0 [ 522.950705] ? check_preemption_disabled+0x41/0x280 [ 522.955705] ? copy_mount_string+0x40/0x40 [ 522.959923] ? copy_mount_options+0x59/0x380 [ 522.964330] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 522.969332] ? kmem_cache_alloc_trace+0x323/0x380 [ 522.974172] ? copy_mount_options+0x26f/0x380 [ 522.978656] ksys_mount+0xcf/0x130 [ 522.982512] __x64_sys_mount+0xba/0x150 [ 522.986484] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 522.991060] do_syscall_64+0xf9/0x620 [ 522.995303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.000578] RIP: 0033:0x46090a [ 523.003757] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.022749] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 523.030540] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 523.037928] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 523.045214] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 523.052469] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 523.059730] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 523.080462] EXT4-fs: failed to create workqueue 14:47:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0xa818d0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) recvmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/4093, 0xffd}, {&(0x7f00000012c0)=""/202, 0xfffffda1}], 0x2}, 0x40000044) 14:47:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x300, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 523.090741] EXT4-fs (loop3): mount failed 14:47:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x353, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:24 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfc, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 523.250991] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 523.261421] FAULT_INJECTION: forcing a failure. [ 523.261421] name failslab, interval 1, probability 0, space 0, times 0 [ 523.279075] CPU: 1 PID: 19564 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 523.286986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.296432] Call Trace: [ 523.299022] dump_stack+0x1fc/0x2fe [ 523.302769] should_fail.cold+0xa/0x14 [ 523.306643] ? setup_fault_attr+0x200/0x200 [ 523.310952] ? lock_acquire+0x170/0x3c0 [ 523.314915] __should_failslab+0x115/0x180 [ 523.319130] should_failslab+0x5/0xf [ 523.322838] __kmalloc+0x2ab/0x3c0 [ 523.326361] ? __alloc_workqueue_key+0x789/0xed0 [ 523.331104] __alloc_workqueue_key+0x789/0xed0 [ 523.335686] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 523.340256] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 523.345319] ext4_fill_super+0x6edb/0xc820 [ 523.349565] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 523.354709] ? snprintf+0xbb/0xf0 [ 523.358150] ? wait_for_completion_io+0x10/0x10 [ 523.362863] ? set_blocksize+0x163/0x3f0 [ 523.366909] mount_bdev+0x2fc/0x3b0 [ 523.370521] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 523.375613] mount_fs+0xa3/0x30c [ 523.378973] vfs_kern_mount.part.0+0x68/0x470 [ 523.383465] do_mount+0x113c/0x2f10 [ 523.387090] ? copy_mount_string+0x40/0x40 [ 523.391347] ? copy_mount_options+0x1da/0x380 [ 523.395859] ? copy_mount_options+0x1e0/0x380 [ 523.400340] ? copy_mount_options+0x26f/0x380 [ 523.404821] ksys_mount+0xcf/0x130 [ 523.408364] __x64_sys_mount+0xba/0x150 [ 523.412330] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 523.417419] do_syscall_64+0xf9/0x620 [ 523.421220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.426402] RIP: 0033:0x46090a [ 523.429576] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.448464] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 523.456159] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 523.463412] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 523.470672] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 523.477938] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 523.485203] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 523.501409] EXT4-fs: failed to create workqueue [ 523.506105] EXT4-fs (loop3): mount failed 14:47:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x0, 0x3, 0x4, 0x2, 0x4, {}, {0x4, 0x8, 0x80, 0x6, 0xf7, 0x8, "818140f3"}, 0x80000000, 0x2, @fd}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020a0000020000000097fcf30b500000"], 0x10}}, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0xffffffffffffffff}, 0xc) ptrace$cont(0xffffffffffffffff, r0, 0x2, 0x0) ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) 14:47:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x700, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:27 executing program 1: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000100)={0x401, 0x9, 0xd394, 0xcf3692ff808aa22e, 0xc5df}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) lseek(0xffffffffffffffff, 0x0, 0x1) 14:47:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:27 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xe00, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 525.784761] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 525.808231] FAULT_INJECTION: forcing a failure. [ 525.808231] name failslab, interval 1, probability 0, space 0, times 0 [ 525.870123] CPU: 1 PID: 19584 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 525.878045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.887438] Call Trace: [ 525.890047] dump_stack+0x1fc/0x2fe [ 525.893697] should_fail.cold+0xa/0x14 [ 525.897605] ? setup_fault_attr+0x200/0x200 [ 525.901938] ? lock_acquire+0x170/0x3c0 [ 525.905933] __should_failslab+0x115/0x180 [ 525.910180] should_failslab+0x5/0xf [ 525.913908] __kmalloc+0x2ab/0x3c0 [ 525.917458] ? apply_wqattrs_prepare+0xf7/0xa50 [ 525.922141] apply_wqattrs_prepare+0xf7/0xa50 [ 525.926659] apply_workqueue_attrs_locked+0xc5/0x120 [ 525.931782] __alloc_workqueue_key+0x510/0xed0 [ 525.936385] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 525.941428] ext4_fill_super+0x6edb/0xc820 [ 525.945706] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 525.951010] ? snprintf+0xbb/0xf0 [ 525.954450] ? wait_for_completion_io+0x10/0x10 [ 525.959117] ? set_blocksize+0x163/0x3f0 [ 525.963167] mount_bdev+0x2fc/0x3b0 [ 525.966864] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 525.971954] mount_fs+0xa3/0x30c [ 525.975312] vfs_kern_mount.part.0+0x68/0x470 [ 525.979795] do_mount+0x113c/0x2f10 [ 525.983411] ? retint_kernel+0x2d/0x2d [ 525.987391] ? copy_mount_string+0x40/0x40 [ 525.992236] ? copy_mount_options+0x190/0x380 [ 525.996715] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 526.001541] ? copy_mount_options+0x26f/0x380 [ 526.006117] ksys_mount+0xcf/0x130 [ 526.009655] __x64_sys_mount+0xba/0x150 [ 526.013625] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 526.018210] do_syscall_64+0xf9/0x620 [ 526.021997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.027168] RIP: 0033:0x46090a [ 526.030353] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 526.049239] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 526.056928] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a 14:47:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x10, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "8830cf6023063943"}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) lseek(r0, 0x0, 0x1) 14:47:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf00, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 526.064180] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 526.071864] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 526.079113] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 526.086393] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 526.105734] EXT4-fs: failed to create workqueue [ 526.112378] EXT4-fs (loop3): mount failed 14:47:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x5303, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:27 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 526.176954] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 526.287621] FAULT_INJECTION: forcing a failure. [ 526.287621] name failslab, interval 1, probability 0, space 0, times 0 [ 526.304983] CPU: 0 PID: 19624 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 526.312901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.322267] Call Trace: [ 526.324875] dump_stack+0x1fc/0x2fe [ 526.330181] should_fail.cold+0xa/0x14 [ 526.334085] ? setup_fault_attr+0x200/0x200 [ 526.338418] ? lock_acquire+0x170/0x3c0 [ 526.342413] __should_failslab+0x115/0x180 [ 526.346658] should_failslab+0x5/0xf [ 526.350381] kmem_cache_alloc_trace+0x284/0x380 [ 526.355063] apply_wqattrs_prepare+0x137/0xa50 [ 526.359664] apply_workqueue_attrs_locked+0xc5/0x120 [ 526.364781] __alloc_workqueue_key+0x510/0xed0 [ 526.369381] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 526.374424] ext4_fill_super+0x6edb/0xc820 [ 526.378671] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 526.384323] ? snprintf+0xbb/0xf0 [ 526.388334] ? wait_for_completion_io+0x10/0x10 [ 526.392984] ? set_blocksize+0x163/0x3f0 [ 526.397040] mount_bdev+0x2fc/0x3b0 [ 526.400651] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 526.405748] mount_fs+0xa3/0x30c [ 526.409097] vfs_kern_mount.part.0+0x68/0x470 [ 526.413594] do_mount+0x113c/0x2f10 [ 526.417203] ? lock_acquire+0x170/0x3c0 [ 526.421162] ? check_preemption_disabled+0x41/0x280 [ 526.426164] ? copy_mount_string+0x40/0x40 [ 526.430390] ? copy_mount_options+0x59/0x380 [ 526.434779] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 526.439781] ? kmem_cache_alloc_trace+0x323/0x380 [ 526.444609] ? copy_mount_options+0x26f/0x380 [ 526.449084] ksys_mount+0xcf/0x130 [ 526.452607] __x64_sys_mount+0xba/0x150 [ 526.456573] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 526.461136] do_syscall_64+0xf9/0x620 [ 526.464934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.470100] RIP: 0033:0x46090a [ 526.473273] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 526.492160] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 526.499854] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 526.507110] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 526.514365] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 526.521621] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 526.528874] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 526.552025] EXT4-fs: failed to create workqueue [ 526.559029] EXT4-fs (loop3): mount failed 14:47:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3], 0x1, 0x100000, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000100)={0x1f, 0x0, {0x2, 0x3, 0xebd, 0x0, 0x27}, 0x7}) ptrace$cont(0x18, r0, 0x0, 0x0) acct(0x0) 14:47:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101a00, 0x0) dup(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0x7cbd, 0x8, 0x1, 'queue1\x00', 0x1}) 14:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f", 0x5e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x104, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x6000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:30 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 528.857078] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 528.869823] FAULT_INJECTION: forcing a failure. [ 528.869823] name failslab, interval 1, probability 0, space 0, times 0 [ 528.918332] CPU: 1 PID: 19644 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 528.926252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.935620] Call Trace: [ 528.938231] dump_stack+0x1fc/0x2fe [ 528.941874] should_fail.cold+0xa/0x14 [ 528.945775] ? setup_fault_attr+0x200/0x200 [ 528.950102] ? lock_acquire+0x170/0x3c0 [ 528.954094] __should_failslab+0x115/0x180 [ 528.958337] should_failslab+0x5/0xf [ 528.962060] kmem_cache_alloc_trace+0x284/0x380 [ 528.966743] apply_wqattrs_prepare+0x1c4/0xa50 [ 528.971349] apply_workqueue_attrs_locked+0xc5/0x120 [ 528.976559] __alloc_workqueue_key+0x510/0xed0 [ 528.981156] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 528.986200] ext4_fill_super+0x6edb/0xc820 [ 528.990570] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 528.995683] ? snprintf+0xbb/0xf0 [ 528.999148] ? wait_for_completion_io+0x10/0x10 [ 529.003819] ? set_blocksize+0x163/0x3f0 [ 529.007894] mount_bdev+0x2fc/0x3b0 [ 529.011532] ? ext4_calculate_overhead+0x11c0/0x11c0 14:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x34000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c00000000000000", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x400300, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 529.016655] mount_fs+0xa3/0x30c [ 529.020034] vfs_kern_mount.part.0+0x68/0x470 [ 529.024541] do_mount+0x113c/0x2f10 [ 529.028238] ? lock_acquire+0x170/0x3c0 [ 529.032219] ? check_preemption_disabled+0x41/0x280 [ 529.037507] ? copy_mount_string+0x40/0x40 [ 529.041752] ? copy_mount_options+0x59/0x380 [ 529.046178] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 529.051219] ? kmem_cache_alloc_trace+0x323/0x380 [ 529.056208] ? copy_mount_options+0x26f/0x380 [ 529.060726] ksys_mount+0xcf/0x130 [ 529.064284] __x64_sys_mount+0xba/0x150 14:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x108, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 529.068276] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 529.072870] do_syscall_64+0xf9/0x620 [ 529.076690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.082067] RIP: 0033:0x46090a [ 529.085294] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 529.104205] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 529.111928] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 529.119209] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 529.126491] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 529.134050] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 529.141351] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 529.162317] EXT4-fs: failed to create workqueue [ 529.167176] EXT4-fs (loop3): mount failed 14:47:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf0ffff, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40042, 0x0) lseek(r0, 0x4, 0x1) mkdir(&(0x7f0000000000)='./file1\x00', 0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40000, 0x159) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) 14:47:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:33 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f", 0x5e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 531.881838] FAULT_INJECTION: forcing a failure. [ 531.881838] name failslab, interval 1, probability 0, space 0, times 0 [ 531.897008] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 14:47:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x1000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 531.936785] CPU: 1 PID: 19694 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 531.944726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.954170] Call Trace: [ 531.956775] dump_stack+0x1fc/0x2fe [ 531.960430] should_fail.cold+0xa/0x14 [ 531.964334] ? setup_fault_attr+0x200/0x200 [ 531.968669] ? lock_acquire+0x170/0x3c0 [ 531.972691] __should_failslab+0x115/0x180 [ 531.976931] should_failslab+0x5/0xf [ 531.980645] __kmalloc+0x2ab/0x3c0 [ 531.984194] ? apply_wqattrs_prepare+0xf7/0xa50 [ 531.988874] apply_wqattrs_prepare+0xf7/0xa50 [ 531.993385] apply_workqueue_attrs_locked+0xc5/0x120 [ 531.998501] __alloc_workqueue_key+0x510/0xed0 [ 532.003111] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 532.008160] ext4_fill_super+0x6edb/0xc820 [ 532.012432] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 532.020945] ? snprintf+0xbb/0xf0 [ 532.024391] ? wait_for_completion_io+0x10/0x10 [ 532.029044] ? set_blocksize+0x163/0x3f0 [ 532.033182] mount_bdev+0x2fc/0x3b0 [ 532.036794] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 532.041884] mount_fs+0xa3/0x30c [ 532.045257] vfs_kern_mount.part.0+0x68/0x470 [ 532.049744] do_mount+0x113c/0x2f10 [ 532.053380] ? do_raw_spin_unlock+0x171/0x230 [ 532.057860] ? check_preemption_disabled+0x41/0x280 [ 532.062864] ? copy_mount_string+0x40/0x40 [ 532.067083] ? copy_mount_options+0x59/0x380 [ 532.071506] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 532.076505] ? kmem_cache_alloc_trace+0x323/0x380 [ 532.081343] ? copy_mount_options+0x26f/0x380 [ 532.085834] ksys_mount+0xcf/0x130 [ 532.089361] __x64_sys_mount+0xba/0x150 [ 532.093320] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 532.097897] do_syscall_64+0xf9/0x620 [ 532.101696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.106897] RIP: 0033:0x46090a [ 532.110074] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 532.128958] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 14:47:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x2000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_MCE_KILL_GET(0x22) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x8925, 0x20000000) ioctl$TCFLSH(r1, 0x540b, 0x2) lseek(r0, 0x0, 0x1) [ 532.136652] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 532.143906] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 532.151159] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 532.158421] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 532.165676] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x3000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = getpid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c0000001000050726bd70000000200000e90000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a000100767863616e000000180002801400010000000000", @ANYRES32, @ANYBLOB="00800600002000000a000500040000000000000008001300", @ANYRES32=r2], 0x5c}}, 0x0) lseek(r0, 0x0, 0x1) [ 532.208327] EXT4-fs: failed to create workqueue [ 532.224401] EXT4-fs (loop3): mount failed [ 532.276636] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 532.359551] IPVS: ftp: loaded support on port[0] = 21 [ 532.472245] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 532.522444] IPVS: ftp: loaded support on port[0] = 21 [ 532.639858] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 14:47:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x20, 0x401, 0x5, 0x81, 0x401, 0x1, 0xa59, 0x4, r3}, &(0x7f0000000140)=0x20) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000000)={0xe, 0x8, 0x7}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x700, 0x40, 0x4, 0x10001, {{0x33, 0x4, 0x1, 0x17, 0xcc, 0x67, 0x0, 0x20, 0x2d, 0x0, @multicast1, @rand_addr=0x64010101, {[@cipso={0x86, 0x12, 0x2, [{0x0, 0x8, "d3be83cf11a6"}, {0x2, 0x4, "45c0"}]}, @timestamp_addr={0x44, 0x4c, 0x61, 0x1, 0xd, [{@multicast1, 0xb3cb}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x9581}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80}, {@dev={0xac, 0x14, 0x14, 0x22}, 0x67c}, {@multicast1, 0x20}, {@dev={0xac, 0x14, 0x14, 0x30}, 0xffffffff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@local, 0x2}, {@local, 0x6}]}, @timestamp_prespec={0x44, 0x34, 0xc1, 0x3, 0x0, [{@loopback, 0x100}, {@rand_addr=0x64010102, 0x8}, {@multicast1, 0x8}, {@broadcast}, {@remote, 0x4}, {@local, 0x7}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x1c, 0xea, 0x0, 0x5, [0x0, 0x7, 0xfa, 0x5, 0x7, 0xd926]}, @ra={0x94, 0x4}, @end]}}}}}) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x4000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:36 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10a, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0x9f0000, 0x0, 0x4, r3, 0x0, &(0x7f0000000040)={0x98091d, 0xd69, [], @p_u16=&(0x7f0000000000)=0x6}}) lseek(r1, 0x0, 0x1) 14:47:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f", 0x5e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 534.917054] FAULT_INJECTION: forcing a failure. [ 534.917054] name failslab, interval 1, probability 0, space 0, times 0 [ 534.928752] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 534.945156] CPU: 1 PID: 19801 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 534.953072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.962436] Call Trace: 14:47:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x7000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 534.965075] dump_stack+0x1fc/0x2fe [ 534.968723] should_fail.cold+0xa/0x14 [ 534.972650] ? setup_fault_attr+0x200/0x200 [ 534.976972] ? lock_acquire+0x170/0x3c0 [ 534.981088] __should_failslab+0x115/0x180 [ 534.985326] should_failslab+0x5/0xf [ 534.989022] __kmalloc+0x2ab/0x3c0 [ 534.992566] ? apply_wqattrs_prepare+0xf7/0xa50 [ 534.997273] apply_wqattrs_prepare+0xf7/0xa50 [ 535.001780] apply_workqueue_attrs_locked+0xc5/0x120 [ 535.006881] __alloc_workqueue_key+0x510/0xed0 [ 535.011484] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 535.016519] ext4_fill_super+0x6edb/0xc820 [ 535.020796] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 535.025918] ? snprintf+0xbb/0xf0 [ 535.029370] ? wait_for_completion_io+0x10/0x10 [ 535.034031] ? set_blocksize+0x163/0x3f0 [ 535.038098] mount_bdev+0x2fc/0x3b0 [ 535.041726] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 535.046827] mount_fs+0xa3/0x30c [ 535.050202] vfs_kern_mount.part.0+0x68/0x470 [ 535.054687] do_mount+0x113c/0x2f10 [ 535.058301] ? lock_acquire+0x170/0x3c0 [ 535.062271] ? check_preemption_disabled+0x41/0x280 [ 535.067281] ? copy_mount_string+0x40/0x40 [ 535.071518] ? copy_mount_options+0x59/0x380 [ 535.075912] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 535.080923] ? kmem_cache_alloc_trace+0x323/0x380 [ 535.085777] ? copy_mount_options+0x26f/0x380 [ 535.090293] ksys_mount+0xcf/0x130 [ 535.093825] __x64_sys_mount+0xba/0x150 [ 535.097796] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 535.102372] do_syscall_64+0xf9/0x620 [ 535.106180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.111380] RIP: 0033:0x46090a [ 535.114575] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 535.133561] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 535.141265] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 535.148572] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 535.155974] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 14:47:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='overlay\x00', 0x9404a0, &(0x7f00000003c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@nfs_export_off='nfs_export=off'}, {@nfs_export_on='nfs_export=on'}, {@index_off='index=off'}, {@index_off='index=off'}, {@index_on='index=on'}, {@xino_off='xino=off'}, {@xino_on='xino=on'}], [{@fowner_gt={'fowner>', 0xee01}}, {@uid_gt={'uid>', 0xee01}}, {@dont_appraise='dont_appraise'}]}) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = msgget$private(0x0, 0x2) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)=0x0) r6 = getpid() msgctl$IPC_SET(r1, 0x1, &(0x7f00000002c0)={{0x2, r2, r3, 0xee00, r4, 0x10, 0x80}, 0x0, 0x0, 0xe17, 0x8, 0x1e5, 0x8e, 0xfffffffffffffffd, 0xfba, 0x7ff, 0x1000, r5, r6}) [ 535.163237] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 535.170520] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 535.180287] EXT4-fs: failed to create workqueue [ 535.185143] EXT4-fs (loop3): mount failed 14:47:36 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) lseek(r0, 0x0, 0x1) 14:47:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x8000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 535.329234] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 535.397061] FAULT_INJECTION: forcing a failure. [ 535.397061] name failslab, interval 1, probability 0, space 0, times 0 [ 535.423162] CPU: 0 PID: 19837 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 535.431104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.440463] Call Trace: [ 535.443066] dump_stack+0x1fc/0x2fe [ 535.446707] should_fail.cold+0xa/0x14 [ 535.450607] ? setup_fault_attr+0x200/0x200 [ 535.454935] ? lock_acquire+0x170/0x3c0 [ 535.458930] __should_failslab+0x115/0x180 [ 535.463176] should_failslab+0x5/0xf [ 535.466900] kmem_cache_alloc_node+0x245/0x3b0 [ 535.471502] alloc_unbound_pwq+0x4a4/0xc10 [ 535.475752] apply_wqattrs_prepare+0x3c0/0xa50 [ 535.480359] apply_workqueue_attrs_locked+0xc5/0x120 [ 535.485476] __alloc_workqueue_key+0x510/0xed0 [ 535.490076] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 535.495127] ext4_fill_super+0x6edb/0xc820 [ 535.499394] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 535.504509] ? snprintf+0xbb/0xf0 [ 535.507966] ? wait_for_completion_io+0x10/0x10 [ 535.512629] ? set_blocksize+0x163/0x3f0 [ 535.516710] mount_bdev+0x2fc/0x3b0 [ 535.520328] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 535.525420] mount_fs+0xa3/0x30c [ 535.528774] vfs_kern_mount.part.0+0x68/0x470 [ 535.533274] do_mount+0x113c/0x2f10 [ 535.536890] ? do_raw_spin_unlock+0x171/0x230 [ 535.541368] ? check_preemption_disabled+0x41/0x280 [ 535.546374] ? copy_mount_string+0x40/0x40 [ 535.550611] ? copy_mount_options+0x59/0x380 [ 535.555195] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 535.560196] ? kmem_cache_alloc_trace+0x323/0x380 [ 535.565026] ? copy_mount_options+0x26f/0x380 [ 535.569557] ksys_mount+0xcf/0x130 [ 535.573104] __x64_sys_mount+0xba/0x150 [ 535.577076] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 535.581653] do_syscall_64+0xf9/0x620 [ 535.585465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.590641] RIP: 0033:0x46090a [ 535.593830] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 535.612716] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 535.620413] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 535.627692] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 535.634962] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 535.642245] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 535.649513] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 535.669614] EXT4-fs: failed to create workqueue [ 535.674302] EXT4-fs (loop3): mount failed 14:47:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'team_slave_1\x00'}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x41) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40001, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000100)={0x20, "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"}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000380)={0x0, @ipx={0x4, 0x6, 0x9, "c9427f6c0076"}, @sco, @sco={0x1f, @none}, 0x9, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x8, 0x1}) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x0, 0x1, 0x5, 0x8, 0x0, "2f523322495a2fe5ecd31fe457454bd363bfca665b2f9094d05072e6f8c2a1ce67168663d8e134dbe02713b46b6f79073d51c78faca9ba10183dfa8eaeda04", 0x2c}, 0x60) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000200)="e254178306fdef1cb05d2a85a95fa887", 0x10) 14:47:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xe000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:39 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x53aa, 0x81}, &(0x7f0000000040)=0x8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) lseek(r1, 0x1ff, 0x4) 14:47:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) timer_create(0x6, &(0x7f0000000040)={0x0, 0x13, 0x1, @thr={&(0x7f0000000100)="29a8ac74f19ad482ce14aa8612e0d40c4aecd8fb80da066885a45269d8eb06133c55ea14df71ef32c8da0a546b64a3e09c548c98b91b1ffe1fddf7002a9fdfcfd79351d39bb6cd0df8732fd2d1ccc13702c52a78c2df9d6f36cf7e669c311eb586e569622a16164252cff194f7d323fa34edbbdf131c8779a21c85f8124f9fae56fe4b2323048da93657be712c85859b73d2bc6e23d1cdafc9eeaedb7e723845da6bbd26", &(0x7f00000001c0)="de3098010b08d94e867137205fdc0dfe43fdb04cb948cc7dd592cdbfdcc89b2668c168ee30fd02ebe8e92a693416068fbf6b2264120b8e2f789d6c9c4dfb0e0eeb6fcb821457ba454227ca5d985fe710965625b8950ebf3a2e663082f8ede04e88ba12177ce800ea093e1de5819a3969c40afeb850b51486f654d1d66c7f5e80d72ad0eaaf21421b1a94f8794002e58fe14dd22e241caab15b5f77a8a98907e9d706bc306c525cec2d771f6f8b4a880214ed38a1b753311fc7061a0991b42f937b07926c739439fcf3243a029a67ce702c3cd6ea88041d89b0acbbeacbc75a52eff202"}}, &(0x7f0000000080)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) open_by_handle_at(r0, &(0x7f00000002c0)={0xc2, 0x80, "d93c1612481293bf9a42916b9c0201357110e2f95b89e253a16e444e3af0e499a0d6fa35429bf6eb852a5d9c14f845c2133d3173f4267a2e69d41ade0a1937cb85a8d68cff45f411b8baf9dce840122b3d7b884c450dc0c8b5761d222e2fe4a599dd10c5948ddbd4eee6dedfd22209b8196b57b0e67b5a16b78b4252b93dbb61a37b723873764083f7b38b77bd4741782a7adb23d6c757eee052978edc4747206b59726fb70ff56d48db50b854157b5483f348a46fb1a65d5d64"}, 0x10000) ptrace$cont(0x18, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x100000) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r1, 0x3312, 0x83) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x82) sendmsg$nl_route_sched(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)=@deltaction={0xa0, 0x31, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x597}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x20040004) ptrace$cont(0x18, 0x0, 0x0, 0x2) 14:47:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 537.982652] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 538.017091] FAULT_INJECTION: forcing a failure. [ 538.017091] name failslab, interval 1, probability 0, space 0, times 0 [ 538.028640] CPU: 1 PID: 19865 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 538.036528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.045884] Call Trace: [ 538.048488] dump_stack+0x1fc/0x2fe [ 538.052121] should_fail.cold+0xa/0x14 [ 538.055994] ? kernel_poison_pages+0x2c/0x2a0 [ 538.060942] ? setup_fault_attr+0x200/0x200 [ 538.065251] ? get_page_from_freelist+0x1e7f/0x4170 [ 538.070321] __should_failslab+0x115/0x180 [ 538.074587] should_failslab+0x5/0xf [ 538.078282] kmem_cache_alloc+0x3f/0x370 [ 538.082352] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 538.087978] radix_tree_extend+0x191/0x4b0 [ 538.092197] ? mem_cgroup_oom_trylock+0x220/0x220 [ 538.097026] __radix_tree_create+0x448/0x540 [ 538.101424] page_cache_tree_insert+0xac/0x3f0 [ 538.105991] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 538.111513] ? lock_acquire+0x170/0x3c0 [ 538.115471] ? __add_to_page_cache_locked+0x45e/0xb60 [ 538.120830] __add_to_page_cache_locked+0x46e/0xb60 [ 538.125839] ? page_cache_tree_insert+0x3f0/0x3f0 [ 538.130710] add_to_page_cache_lru+0x16a/0x680 [ 538.135391] ? add_to_page_cache_locked+0x40/0x40 [ 538.140377] pagecache_get_page+0x478/0xd50 [ 538.144702] __getblk_slow+0x216/0x9e0 [ 538.148691] __getblk_gfp+0x6b/0x70 [ 538.152397] __ext4_get_inode_loc+0x351/0x10f0 [ 538.156970] ? _raw_spin_unlock+0x29/0x40 [ 538.161111] ? iget_locked+0x154/0x480 [ 538.165003] __ext4_iget+0x2ef/0x3e00 [ 538.168800] ? __alloc_workqueue_key+0x92d/0xed0 [ 538.173789] ? ext4_get_projid+0x190/0x190 [ 538.178026] ext4_fill_super+0x6f83/0xc820 [ 538.182265] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 538.187359] ? snprintf+0xbb/0xf0 [ 538.190860] ? wait_for_completion_io+0x10/0x10 [ 538.195514] ? set_blocksize+0x163/0x3f0 [ 538.199582] mount_bdev+0x2fc/0x3b0 [ 538.203209] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 538.208315] mount_fs+0xa3/0x30c [ 538.211688] vfs_kern_mount.part.0+0x68/0x470 [ 538.216179] do_mount+0x113c/0x2f10 [ 538.219802] ? lock_acquire+0x170/0x3c0 [ 538.223773] ? check_preemption_disabled+0x41/0x280 [ 538.228776] ? copy_mount_string+0x40/0x40 [ 538.233009] ? copy_mount_options+0x59/0x380 [ 538.237403] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 538.242419] ? kmem_cache_alloc_trace+0x323/0x380 [ 538.247260] ? copy_mount_options+0x26f/0x380 [ 538.251829] ksys_mount+0xcf/0x130 [ 538.255372] __x64_sys_mount+0xba/0x150 [ 538.259343] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 538.263919] do_syscall_64+0xf9/0x620 [ 538.267805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.272988] RIP: 0033:0x46090a [ 538.276181] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 538.295083] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 538.302794] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 538.310148] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 538.317400] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 538.324658] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 14:47:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x53030000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x21) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xf108, 0x1) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 538.331912] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 538.347432] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f0000000040)={0x10001, 0x2, 0xff, 0x1, &(0x7f0000000000)=[{0x5, 0x2, 0x0, 0x3}]}) 14:47:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10b, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:39 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000180)='configfs\x00', 0x1040000, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f00000001c0)) lseek(r0, 0x0, 0x1) 14:47:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x60000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x80ffffff, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 538.512051] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 538.574276] FAULT_INJECTION: forcing a failure. [ 538.574276] name failslab, interval 1, probability 0, space 0, times 0 [ 538.586453] CPU: 0 PID: 19915 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 538.594352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.603713] Call Trace: [ 538.606319] dump_stack+0x1fc/0x2fe [ 538.609970] should_fail.cold+0xa/0x14 [ 538.613870] ? setup_fault_attr+0x200/0x200 [ 538.618200] ? lock_acquire+0x170/0x3c0 [ 538.622197] __should_failslab+0x115/0x180 [ 538.626445] should_failslab+0x5/0xf [ 538.630172] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 538.635299] init_rescuer+0xa1/0x370 [ 538.639036] __alloc_workqueue_key+0xb56/0xed0 [ 538.643661] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 538.648708] ext4_fill_super+0x6edb/0xc820 [ 538.652988] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 538.658111] ? snprintf+0xbb/0xf0 [ 538.661586] ? wait_for_completion_io+0x10/0x10 [ 538.666267] ? set_blocksize+0x163/0x3f0 [ 538.670356] mount_bdev+0x2fc/0x3b0 [ 538.673998] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 538.679141] mount_fs+0xa3/0x30c [ 538.682526] vfs_kern_mount.part.0+0x68/0x470 [ 538.687053] do_mount+0x113c/0x2f10 [ 538.690724] ? do_raw_spin_unlock+0x171/0x230 [ 538.695333] ? check_preemption_disabled+0x41/0x280 [ 538.700359] ? copy_mount_string+0x40/0x40 [ 538.704754] ? copy_mount_options+0x59/0x380 [ 538.709216] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 538.714240] ? kmem_cache_alloc_trace+0x323/0x380 [ 538.719077] ? copy_mount_options+0x26f/0x380 [ 538.724020] ksys_mount+0xcf/0x130 [ 538.727554] __x64_sys_mount+0xba/0x150 [ 538.731529] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 538.736112] do_syscall_64+0xf9/0x620 [ 538.740024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.745371] RIP: 0033:0x46090a [ 538.748726] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 538.767624] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 538.775326] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 538.782587] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 538.789949] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 538.797224] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 538.804547] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 538.814358] EXT4-fs: failed to create workqueue [ 538.819578] EXT4-fs (loop3): mount failed 14:47:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$SNDCTL_DSP_SETDUPLEX(r0, 0x5016, 0x0) 14:47:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:42 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x9effffff, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 541.040156] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 541.041488] FAULT_INJECTION: forcing a failure. [ 541.041488] name failslab, interval 1, probability 0, space 0, times 0 [ 541.079747] CPU: 0 PID: 19939 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 14:47:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 541.087663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.097022] Call Trace: [ 541.099630] dump_stack+0x1fc/0x2fe [ 541.103276] should_fail.cold+0xa/0x14 [ 541.108228] ? __alloc_workqueue_key+0x5e4/0xed0 [ 541.112982] ? setup_fault_attr+0x200/0x200 [ 541.117361] __should_failslab+0x115/0x180 [ 541.121672] should_failslab+0x5/0xf [ 541.125375] kmem_cache_alloc+0x277/0x370 [ 541.129525] ? ext4_sync_fs+0x8d0/0x8d0 [ 541.133495] ext4_alloc_inode+0x1a/0x630 [ 541.137541] ? ext4_sync_fs+0x8d0/0x8d0 [ 541.141505] alloc_inode+0x5d/0x180 [ 541.145121] iget_locked+0x193/0x480 [ 541.148943] __ext4_iget+0x279/0x3e00 [ 541.153089] ? __alloc_workqueue_key+0x92d/0xed0 [ 541.157837] ? ext4_get_projid+0x190/0x190 [ 541.162084] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 541.167181] ext4_fill_super+0x6f83/0xc820 [ 541.171443] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 541.176564] ? snprintf+0xbb/0xf0 [ 541.180063] ? wait_for_completion_io+0x10/0x10 [ 541.184730] ? set_blocksize+0x163/0x3f0 [ 541.188903] mount_bdev+0x2fc/0x3b0 [ 541.192553] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 541.198079] mount_fs+0xa3/0x30c [ 541.201436] vfs_kern_mount.part.0+0x68/0x470 [ 541.205918] do_mount+0x113c/0x2f10 [ 541.209549] ? copy_mount_string+0x40/0x40 [ 541.213781] ? copy_mount_options+0x1da/0x380 [ 541.218265] ? copy_mount_options+0x1e9/0x380 [ 541.222764] ? copy_mount_options+0x26f/0x380 [ 541.227243] ksys_mount+0xcf/0x130 [ 541.230780] __x64_sys_mount+0xba/0x150 [ 541.234755] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 541.239337] do_syscall_64+0xf9/0x620 [ 541.243132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.248305] RIP: 0033:0x46090a [ 541.251491] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 541.270395] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 541.278157] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 541.285425] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 541.292685] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 541.299964] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 541.307236] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 541.320450] EXT4-fs (loop3): get root inode failed [ 541.325582] EXT4-fs (loop3): mount failed 14:47:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x1104000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) 14:47:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xf0ffffff, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0xc894) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000000)={0x2, 0x101}) lseek(r2, 0x0, 0x1) 14:47:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:42 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xfffff000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 541.506847] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 541.542625] FAULT_INJECTION: forcing a failure. [ 541.542625] name failslab, interval 1, probability 0, space 0, times 0 14:47:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 541.553858] CPU: 1 PID: 19971 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 541.561753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.571115] Call Trace: [ 541.573722] dump_stack+0x1fc/0x2fe [ 541.577384] should_fail.cold+0xa/0x14 [ 541.581287] ? kernel_poison_pages+0x2c/0x2a0 [ 541.585795] ? setup_fault_attr+0x200/0x200 [ 541.590136] ? get_page_from_freelist+0x1e7f/0x4170 [ 541.595171] __should_failslab+0x115/0x180 [ 541.599415] should_failslab+0x5/0xf [ 541.603142] kmem_cache_alloc+0x3f/0x370 14:47:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xffffff7f, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 541.607218] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 541.612971] radix_tree_extend+0x191/0x4b0 [ 541.617411] ? mem_cgroup_oom_trylock+0x220/0x220 [ 541.622274] __radix_tree_create+0x448/0x540 [ 541.626703] page_cache_tree_insert+0xac/0x3f0 [ 541.631302] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 541.636761] ? lock_acquire+0x170/0x3c0 [ 541.640787] ? __add_to_page_cache_locked+0x45e/0xb60 [ 541.645464] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 541.645990] __add_to_page_cache_locked+0x46e/0xb60 [ 541.656884] ? page_cache_tree_insert+0x3f0/0x3f0 [ 541.661749] add_to_page_cache_lru+0x16a/0x680 [ 541.666348] ? add_to_page_cache_locked+0x40/0x40 [ 541.671211] pagecache_get_page+0x478/0xd50 [ 541.675548] __getblk_slow+0x216/0x9e0 [ 541.679462] __getblk_gfp+0x6b/0x70 [ 541.683192] __ext4_get_inode_loc+0x351/0x10f0 [ 541.687793] ? _raw_spin_unlock+0x29/0x40 [ 541.691987] ? iget_locked+0x154/0x480 [ 541.695891] __ext4_iget+0x2ef/0x3e00 [ 541.699706] ? __alloc_workqueue_key+0x92d/0xed0 14:47:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x210008, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:47:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xffffff80, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 541.704469] ? ext4_get_projid+0x190/0x190 [ 541.708729] ext4_fill_super+0x6f83/0xc820 [ 541.712999] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 541.718119] ? snprintf+0xbb/0xf0 [ 541.721585] ? wait_for_completion_io+0x10/0x10 [ 541.726265] ? set_blocksize+0x163/0x3f0 [ 541.730341] mount_bdev+0x2fc/0x3b0 [ 541.734085] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 541.739185] mount_fs+0xa3/0x30c [ 541.742547] vfs_kern_mount.part.0+0x68/0x470 [ 541.747239] do_mount+0x113c/0x2f10 [ 541.750917] ? lock_acquire+0x170/0x3c0 [ 541.754896] ? check_preemption_disabled+0x41/0x280 [ 541.759904] ? copy_mount_string+0x40/0x40 [ 541.764122] ? copy_mount_options+0x59/0x380 [ 541.768527] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 541.773583] ? kmem_cache_alloc_trace+0x323/0x380 [ 541.778425] ? copy_mount_options+0x26f/0x380 [ 541.782922] ksys_mount+0xcf/0x130 [ 541.786447] __x64_sys_mount+0xba/0x150 [ 541.790420] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 541.794987] do_syscall_64+0xf9/0x620 [ 541.798786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.803969] RIP: 0033:0x46090a [ 541.807158] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 541.826039] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 541.833724] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 541.841059] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 541.848309] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 541.855557] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 541.862806] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 541.879115] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xffffff9e, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, 0x0) 14:47:45 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:45 executing program 1: setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x7fffffff, 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1000) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:47:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xfffffff0, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$setopts(0x4200, r0, 0x8, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 14:47:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0xffffffff, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, 0x0) 14:47:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x800, 0x0) lseek(r0, 0x0, 0x1) 14:47:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 544.483118] FAULT_INJECTION: forcing a failure. [ 544.483118] name failslab, interval 1, probability 0, space 0, times 0 14:47:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x2, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 544.540715] CPU: 1 PID: 20029 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 544.548635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.558005] Call Trace: [ 544.560640] dump_stack+0x1fc/0x2fe [ 544.564285] should_fail.cold+0xa/0x14 [ 544.568179] ? setup_fault_attr+0x200/0x200 [ 544.572507] ? __lock_acquire+0x6de/0x3ff0 [ 544.576858] __should_failslab+0x115/0x180 [ 544.581112] should_failslab+0x5/0xf [ 544.584827] kmem_cache_alloc+0x3f/0x370 [ 544.588893] ? mempool_alloc+0x350/0x350 [ 544.592949] mempool_alloc+0x146/0x350 [ 544.596833] ? mark_held_locks+0xf0/0xf0 [ 544.600910] ? mempool_resize+0x790/0x790 [ 544.605219] ? kernel_fpu_enable+0x1f/0x40 [ 544.609448] ? kernel_fpu_end+0x11b/0x170 [ 544.613594] ? kernel_fpu_enable+0x40/0x40 [ 544.617837] ? locked_inode_to_wb_and_lock_list+0x1d9/0x980 [ 544.623571] bio_alloc_bioset+0x389/0x5e0 [ 544.627708] ? bvec_alloc+0x2f0/0x2f0 [ 544.631510] ? mark_held_locks+0xa6/0xf0 [ 544.635572] ? __local_bh_enable_ip+0x159/0x270 [ 544.640260] submit_bh_wbc+0x141/0x760 [ 544.644143] __sync_dirty_buffer+0x14e/0x320 [ 544.648549] ext4_commit_super+0x771/0xb70 [ 544.652785] ext4_setup_super+0x584/0x9f0 [ 544.656923] ext4_fill_super+0x70cd/0xc820 [ 544.661157] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 544.666245] ? snprintf+0xbb/0xf0 [ 544.669697] ? wait_for_completion_io+0x10/0x10 [ 544.674374] ? set_blocksize+0x163/0x3f0 [ 544.678433] mount_bdev+0x2fc/0x3b0 [ 544.682061] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 544.687153] mount_fs+0xa3/0x30c [ 544.690518] vfs_kern_mount.part.0+0x68/0x470 [ 544.695022] do_mount+0x113c/0x2f10 [ 544.698645] ? lock_acquire+0x170/0x3c0 [ 544.702615] ? check_preemption_disabled+0x41/0x280 [ 544.707618] ? copy_mount_string+0x40/0x40 [ 544.711854] ? copy_mount_options+0x59/0x380 [ 544.716248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 544.721253] ? kmem_cache_alloc_trace+0x323/0x380 [ 544.726084] ? copy_mount_options+0x26f/0x380 [ 544.730576] ksys_mount+0xcf/0x130 [ 544.734112] __x64_sys_mount+0xba/0x150 [ 544.738071] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 544.742701] do_syscall_64+0xf9/0x620 [ 544.746551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.751948] RIP: 0033:0x46090a [ 544.755130] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 544.774033] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 544.781730] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a 14:47:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/243) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 544.788992] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 544.796268] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 544.803522] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 544.810782] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 544.827997] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, 0x0) 14:47:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0xa04001, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@index_on='index=on'}, {@default_permissions='default_permissions'}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x0, 0x34, 0x38, 0x30, 0x0, 0x30, 0x39], 0x2d, [0x35, 0x66, 0x37, 0x65], 0x2d, [0x33, 0x63, 0x64, 0x63], 0x2d, [0x32, 0x32, 0x34, 0x37], 0x2d, [0x37, 0x36, 0x32, 0x0, 0x63, 0x65, 0x61, 0x61]}}}, {@smackfsroot={'smackfsroot', 0x3d, '-&(]'}}]}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 14:47:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x3, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:48 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199605607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}, {&(0x7f0000000040)="39fb2d9d85270640dd84dd240691c9ee69ef664cccbacd3ee5e5a7d1030622291d05ce8e5980b0f3449be085e0f3d2f4cd1a72143a", 0x35}], 0x5, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x202281, 0x0) write$dsp(r1, 0x0, 0x7ffffffff000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x401, 0x0) write$dsp(r2, 0x0, 0x7ffffffff000) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) fcntl$setpipe(r2, 0x407, 0x8007) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r1, 0x80044dfb, &(0x7f0000000000)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x4, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 547.453910] FAULT_INJECTION: forcing a failure. [ 547.453910] name failslab, interval 1, probability 0, space 0, times 0 [ 547.475041] overlayfs: unrecognized mount option "fsuuid=e" or missing value [ 547.476216] CPU: 0 PID: 20079 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 547.490683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:47:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000000)=@ax25={{0x3, @null}, [@netrom, @rose, @null, @bcast, @rose, @netrom, @netrom, @default]}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/73, 0x49}, {&(0x7f0000000100)=""/64, 0x40}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/50, 0x32}, {&(0x7f0000001200)=""/77, 0x4d}, {&(0x7f0000001280)=""/20, 0x14}, {&(0x7f00000012c0)=""/131, 0x83}, {&(0x7f0000001380)}, {&(0x7f00000013c0)=""/247, 0xf7}, {&(0x7f00000014c0)=""/167, 0xa7}], 0xa}, 0x40000000) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 547.495432] overlayfs: unrecognized mount option "fsuuid=e" or missing value [ 547.500033] Call Trace: [ 547.500055] dump_stack+0x1fc/0x2fe [ 547.500074] should_fail.cold+0xa/0x14 [ 547.500090] ? setup_fault_attr+0x200/0x200 [ 547.500103] ? blk_queue_exit+0x1cd/0x250 [ 547.500116] ? generic_make_request+0x369/0xdf0 [ 547.500136] __should_failslab+0x115/0x180 [ 547.500150] should_failslab+0x5/0xf [ 547.500159] kmem_cache_alloc+0x3f/0x370 [ 547.500176] ? mempool_alloc+0x350/0x350 [ 547.546877] mempool_alloc+0x146/0x350 [ 547.550779] ? submit_bio+0xb1/0x430 [ 547.554508] ? mempool_resize+0x790/0x790 [ 547.558800] ? generic_make_request+0xdf0/0xdf0 [ 547.563514] ? check_preemption_disabled+0x41/0x280 [ 547.568656] ? guard_bio_eod+0x2a0/0x640 [ 547.572712] bio_alloc_bioset+0x389/0x5e0 [ 547.576856] ? bvec_alloc+0x2f0/0x2f0 [ 547.580659] ? __brelse+0x84/0xa0 [ 547.584114] ? __breadahead_gfp+0xd4/0x130 [ 547.588381] submit_bh_wbc+0x141/0x760 [ 547.592285] __ext4_get_inode_loc+0x5c7/0x10f0 [ 547.596885] ? iget_locked+0x154/0x480 [ 547.600761] __ext4_iget+0x2ef/0x3e00 [ 547.604550] ? __alloc_workqueue_key+0x92d/0xed0 [ 547.609300] ? ext4_get_projid+0x190/0x190 [ 547.613546] ext4_fill_super+0x6f83/0xc820 [ 547.617775] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 547.622872] ? snprintf+0xbb/0xf0 [ 547.626323] ? wait_for_completion_io+0x10/0x10 [ 547.631031] ? set_blocksize+0x163/0x3f0 [ 547.635105] mount_bdev+0x2fc/0x3b0 [ 547.638733] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 547.643833] mount_fs+0xa3/0x30c [ 547.647194] vfs_kern_mount.part.0+0x68/0x470 [ 547.651694] do_mount+0x113c/0x2f10 [ 547.655328] ? lock_acquire+0x170/0x3c0 [ 547.659320] ? check_preemption_disabled+0x41/0x280 [ 547.664323] ? copy_mount_string+0x40/0x40 [ 547.668557] ? copy_mount_options+0x59/0x380 [ 547.672974] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 547.678004] ? kmem_cache_alloc_trace+0x323/0x380 [ 547.682853] ? copy_mount_options+0x26f/0x380 [ 547.687360] ksys_mount+0xcf/0x130 [ 547.690907] __x64_sys_mount+0xba/0x150 [ 547.694878] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 547.699452] do_syscall_64+0xf9/0x620 [ 547.703247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.708425] RIP: 0033:0x46090a [ 547.711615] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 547.730520] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 547.738245] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 547.745502] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 14:47:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)) 14:47:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x7, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 547.752767] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 547.760030] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 547.767298] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 547.787529] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:49 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) socketpair(0x22, 0x800, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0/file0', [{0x20, '-[*'}, {0x20, ']+,\xb6\'%!^^+'}, {}], 0xa, "c9e028f8e5650d7d08e154c49436641dc7ebc6385726a8c4515e3b9339d952c4c06230fa402a7de9a3444f41e4d64965d6a084ee9c1fac2745a692fdd95f7c6f05b8feb01371ea91cbfdfba2ba8d8118320f90405e09be3bf4cb9fb6102e6ec439b22448fa822a85296a16293cb60c83a344ad44c68981a54bea52a6c5bb6c8141386c93ed9103f7ec48db4a7975a4d9add846fb1c5309467661d1919bb495d64e89fc1b3c704091980eb04bddaf57bcc364518871"}, 0xd6) [ 547.948507] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 547.957067] EXT4-fs (loop2): group descriptors corrupted! [ 548.049839] FAULT_INJECTION: forcing a failure. [ 548.049839] name failslab, interval 1, probability 0, space 0, times 0 [ 548.063145] CPU: 1 PID: 20118 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 548.071053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.080442] Call Trace: [ 548.083071] dump_stack+0x1fc/0x2fe [ 548.086717] should_fail.cold+0xa/0x14 [ 548.090607] ? setup_fault_attr+0x200/0x200 [ 548.094916] ? lock_acquire+0x170/0x3c0 [ 548.098889] __should_failslab+0x115/0x180 [ 548.103116] should_failslab+0x5/0xf [ 548.106824] kmem_cache_alloc+0x277/0x370 [ 548.110968] add_system_zone+0x10a/0x4e0 [ 548.115012] ext4_setup_system_zone+0x209/0xac0 [ 548.119666] ? ext4_commit_super+0x6f1/0xb70 [ 548.124075] ? ext4_exit_system_zone+0x20/0x20 [ 548.128644] ? ext4_setup_super+0x5f3/0x9f0 [ 548.132953] ext4_fill_super+0x72e0/0xc820 [ 548.137209] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 548.142298] ? snprintf+0xbb/0xf0 [ 548.145773] ? wait_for_completion_io+0x10/0x10 [ 548.150427] ? set_blocksize+0x163/0x3f0 [ 548.154480] mount_bdev+0x2fc/0x3b0 [ 548.158094] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 548.163195] mount_fs+0xa3/0x30c [ 548.166564] vfs_kern_mount.part.0+0x68/0x470 [ 548.171060] do_mount+0x113c/0x2f10 [ 548.174686] ? lock_acquire+0x170/0x3c0 [ 548.178644] ? check_preemption_disabled+0x41/0x280 [ 548.183654] ? copy_mount_string+0x40/0x40 [ 548.187869] ? copy_mount_options+0x59/0x380 [ 548.192261] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 548.197262] ? kmem_cache_alloc_trace+0x323/0x380 [ 548.202102] ? copy_mount_options+0x26f/0x380 [ 548.206605] ksys_mount+0xcf/0x130 [ 548.210130] __x64_sys_mount+0xba/0x150 [ 548.214099] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 548.218680] do_syscall_64+0xf9/0x620 [ 548.222501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.227672] RIP: 0033:0x46090a [ 548.230862] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 548.249747] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 548.257440] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 548.264714] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 548.271986] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 548.279428] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 548.287300] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 548.320007] EXT4-fs (loop3): failed to initialize system zone (-12) [ 548.326750] EXT4-fs (loop3): mount failed 14:47:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x8, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x480, 0x14, 0x20, 0x70bd2c, 0x25dfdbfb, {0x4, 0x20}, [@INET_DIAG_REQ_BYTECODE={0xf6, 0x1, "64924aa5c602fd95b4ce95a439f3de942b2a84609c735c8f4bea0397e510595af1c08e0d821a46d4d4ae7d3588fb0d65ae66296e93d4ddec2a8d20f588ef958142558cb1684b8e65dbdf222874592760a5c72c8c43fb90c103ed2ceebe0d0d3ca9e8bb443009e65d75afa61a5b6c4b5527faa92151a832bae0b232ed7f00d7d836943d392d30ac75f09014b6391c5bac44ec64bec7fb2373a6c7b8bbd87b4740570f3d0de46cf4e54305234193695b98882ef5ca3df8573ba6315f8635cb013bd020c8162a8a830eaa85f85eef8c928c3aa2057477846054d94b0151cdd1a96ab9e27afcce27fc54c82c126bfed6fbfb4a7e"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "550e8ec5385e961d1324e5cb70fd8b61fe4931461620845b7a9a1c97f605aaf8a589baeef8f85b910f605c9d780a2986443979ac30e5715d72a1c51648796345aef3373681076c151d5ab74cbe4ff5ba01dcc1f3bddb6568b441b5cf7db2b7c1a05c716507343d1d5b763bd1af52e5dbcf06c9d4bcbd2a9bc6836190cfa2d81ffecbd9356085331602b5bacc7ba95cf89f85dc1cc5bf79aa352d3e667524cdcbdcf2260799091310efe57e3c7bcd0e46d62bce68cc1dce81472ddcd24189c6f2cbd831a28c419591005b3eca960e"}, @INET_DIAG_REQ_BYTECODE={0x103, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x8f, 0x1, "a97c9073c9c80fbf97aff9fffd55aec55a6f75706640ffcfdfe1fc760faf6b9c41a78115e87c53c1e149e3e88848a159dfa4d6fbc7ae046a4e62176e7d99c7cb5d73649e619efa967bdccb5e90cf3fe05b15566eae1b333bc0c80d0e3f36bdfc3bdbd94f26ca70478677bedaeef58206aa44f2590f35e5a78c875c114f51f13a4d1e896558bb2374bc6075"}, @INET_DIAG_REQ_BYTECODE={0x4e, 0x1, "89ff27712a5323e4097511b12d47641795dd817c72edf54b23f8a3b377d9caa37d4fe26e9326693f7fcf93557489bd216bda5e0e5b25a004b182699e84083c3378e29d9514976347b438"}, @INET_DIAG_REQ_BYTECODE={0xb9, 0x1, "915c5968c52a051c6321d09eddc52f13ed22141de75e18fcd6d74aa0751ffbcb9341afb447e5067ba7531242ef99724675f839cfc167949bb474b878a78adc04c0e4993d311cf1f6e77a068a209e511b7d224f242e527f90491500b60a90cf35b1e560c1b97adc9cf1ef58040f99230a280a72cd6e03bc0f7a0147d7c1ec75289bcf227dece65efe1a7c1035ef13a5b655a0e2fc20f3fd52f3b9c724399718f83917bb197560062a92a95d50ecb99b61f328ecb9bd"}]}, 0x480}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000c0) 14:47:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)) 14:47:51 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) read$FUSE(r1, &(0x7f0000000480)={0x2020}, 0x2020) 14:47:51 executing program 1: socket$inet6(0xa, 0x5, 0x10001) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 550.495424] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 550.521381] FAULT_INJECTION: forcing a failure. [ 550.521381] name failslab, interval 1, probability 0, space 0, times 0 [ 550.536302] EXT4-fs (loop2): group descriptors corrupted! [ 550.570587] CPU: 0 PID: 20149 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 550.578512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.588047] Call Trace: [ 550.590652] dump_stack+0x1fc/0x2fe [ 550.594296] should_fail.cold+0xa/0x14 [ 550.598211] ? setup_fault_attr+0x200/0x200 [ 550.602540] ? lock_acquire+0x170/0x3c0 [ 550.606533] __should_failslab+0x115/0x180 [ 550.610778] should_failslab+0x5/0xf [ 550.614498] kmem_cache_alloc+0x277/0x370 [ 550.618682] add_system_zone+0x10a/0x4e0 [ 550.622757] ext4_setup_system_zone+0x366/0xac0 [ 550.627436] ? ext4_commit_super+0x6f1/0xb70 [ 550.631859] ? ext4_exit_system_zone+0x20/0x20 [ 550.636467] ? ext4_setup_super+0x5f3/0x9f0 [ 550.640811] ext4_fill_super+0x72e0/0xc820 [ 550.645089] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 550.650296] ? snprintf+0xbb/0xf0 [ 550.653776] ? wait_for_completion_io+0x10/0x10 [ 550.658460] ? set_blocksize+0x163/0x3f0 [ 550.663401] mount_bdev+0x2fc/0x3b0 14:47:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xe, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000040)) 14:47:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x21) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xf108, 0x1) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 550.667040] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 550.672161] mount_fs+0xa3/0x30c [ 550.675543] vfs_kern_mount.part.0+0x68/0x470 [ 550.680054] do_mount+0x113c/0x2f10 [ 550.683693] ? lock_acquire+0x170/0x3c0 [ 550.687933] ? check_preemption_disabled+0x41/0x280 [ 550.692957] ? copy_mount_string+0x40/0x40 [ 550.697192] ? copy_mount_options+0x59/0x380 [ 550.701601] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 550.706623] ? kmem_cache_alloc_trace+0x323/0x380 [ 550.711480] ? copy_mount_options+0x26f/0x380 [ 550.716115] ksys_mount+0xcf/0x130 [ 550.719669] __x64_sys_mount+0xba/0x150 [ 550.723642] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 550.728345] do_syscall_64+0xf9/0x620 [ 550.732140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.737321] RIP: 0033:0x46090a [ 550.740587] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 550.759491] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 550.767218] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 550.774818] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 550.782100] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 550.789373] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 550.796716] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 550.811399] EXT4-fs (loop3): mounted filesystem without journal. Opts: noload,,errors=continue 14:47:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x7000000, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xf, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:52 executing program 3 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 550.878258] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 550.901119] EXT4-fs (loop2): group descriptors corrupted! 14:47:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x6000, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x60, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 551.089206] FAULT_INJECTION: forcing a failure. [ 551.089206] name failslab, interval 1, probability 0, space 0, times 0 [ 551.135783] CPU: 1 PID: 20194 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 551.143718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.153169] Call Trace: [ 551.155859] dump_stack+0x1fc/0x2fe [ 551.159599] should_fail.cold+0xa/0x14 [ 551.163526] ? setup_fault_attr+0x200/0x200 [ 551.167834] ? lock_acquire+0x170/0x3c0 [ 551.172079] __should_failslab+0x115/0x180 [ 551.176307] should_failslab+0x5/0xf [ 551.180029] kmem_cache_alloc+0x277/0x370 [ 551.184166] add_system_zone+0x10a/0x4e0 [ 551.188238] ext4_setup_system_zone+0x396/0xac0 [ 551.192895] ? ext4_commit_super+0x6f1/0xb70 [ 551.197289] ? ext4_exit_system_zone+0x20/0x20 [ 551.201861] ? ext4_setup_super+0x5f3/0x9f0 [ 551.206217] ext4_fill_super+0x72e0/0xc820 [ 551.210449] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 551.215627] ? snprintf+0xbb/0xf0 [ 551.219074] ? wait_for_completion_io+0x10/0x10 [ 551.223815] ? set_blocksize+0x163/0x3f0 [ 551.227864] mount_bdev+0x2fc/0x3b0 [ 551.231491] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 551.236584] mount_fs+0xa3/0x30c [ 551.239936] vfs_kern_mount.part.0+0x68/0x470 [ 551.244436] do_mount+0x113c/0x2f10 [ 551.248053] ? lock_acquire+0x170/0x3c0 [ 551.252012] ? check_preemption_disabled+0x41/0x280 [ 551.257036] ? copy_mount_string+0x40/0x40 [ 551.261265] ? copy_mount_options+0x59/0x380 [ 551.265683] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 551.270708] ? kmem_cache_alloc_trace+0x323/0x380 [ 551.275560] ? copy_mount_options+0x26f/0x380 [ 551.280502] ksys_mount+0xcf/0x130 [ 551.284031] __x64_sys_mount+0xba/0x150 [ 551.287993] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 551.292572] do_syscall_64+0xf9/0x620 [ 551.296361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.301534] RIP: 0033:0x46090a [ 551.305927] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 551.324818] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 551.332512] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 551.339780] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 551.347035] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 551.354323] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 551.361575] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 551.371869] EXT4-fs (loop3): failed to initialize system zone (-12) [ 551.378836] EXT4-fs (loop3): mount failed 14:47:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0000020000000000000000ac06004bb692a3fea6243dea5359adccf061"], 0x10}}, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x2}) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) 14:47:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xf0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:55 executing program 3 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x300, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) 14:47:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) [ 553.913525] FAULT_INJECTION: forcing a failure. [ 553.913525] name failslab, interval 1, probability 0, space 0, times 0 [ 553.936766] CPU: 0 PID: 20237 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 553.944862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.954222] Call Trace: [ 553.956831] dump_stack+0x1fc/0x2fe [ 553.960462] should_fail.cold+0xa/0x14 [ 553.964375] ? setup_fault_attr+0x200/0x200 [ 553.968696] ? lock_acquire+0x170/0x3c0 [ 553.972662] __should_failslab+0x115/0x180 [ 553.976889] should_failslab+0x5/0xf [ 553.980594] kmem_cache_alloc+0x277/0x370 [ 553.984743] add_system_zone+0x10a/0x4e0 [ 553.988813] ext4_setup_system_zone+0x396/0xac0 [ 553.993469] ? ext4_commit_super+0x6f1/0xb70 [ 553.998041] ? ext4_exit_system_zone+0x20/0x20 [ 554.002624] ? ext4_setup_super+0x5f3/0x9f0 [ 554.006937] ext4_fill_super+0x72e0/0xc820 [ 554.011182] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 554.016274] ? snprintf+0xbb/0xf0 [ 554.019740] ? wait_for_completion_io+0x10/0x10 [ 554.024393] ? set_blocksize+0x163/0x3f0 [ 554.028445] mount_bdev+0x2fc/0x3b0 [ 554.032060] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 554.037149] mount_fs+0xa3/0x30c [ 554.040938] vfs_kern_mount.part.0+0x68/0x470 [ 554.045420] do_mount+0x113c/0x2f10 [ 554.049050] ? retint_kernel+0x2d/0x2d [ 554.053030] ? copy_mount_string+0x40/0x40 [ 554.057378] ? copy_mount_options+0x1cd/0x380 14:47:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 554.061971] ? copy_mount_options+0x1da/0x380 [ 554.066477] ? __sanitizer_cov_trace_pc+0xd/0x50 [ 554.071255] ? copy_mount_options+0x26f/0x380 [ 554.075766] ksys_mount+0xcf/0x130 [ 554.079383] __x64_sys_mount+0xba/0x150 [ 554.083368] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 554.087959] do_syscall_64+0xf9/0x620 [ 554.091780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.096977] RIP: 0033:0x46090a 14:47:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x353, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 554.100180] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 554.119622] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 554.127341] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 554.134607] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 554.141879] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 554.149143] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 554.156402] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:47:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x700, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 554.175448] EXT4-fs (loop3): failed to initialize system zone (-12) [ 554.188017] EXT4-fs (loop3): mount failed 14:47:55 executing program 3 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 554.312857] FAULT_INJECTION: forcing a failure. [ 554.312857] name failslab, interval 1, probability 0, space 0, times 0 [ 554.324477] CPU: 0 PID: 20261 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 554.332501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.341858] Call Trace: [ 554.344432] dump_stack+0x1fc/0x2fe [ 554.348060] should_fail.cold+0xa/0x14 [ 554.352116] ? setup_fault_attr+0x200/0x200 [ 554.356449] ? lock_acquire+0x170/0x3c0 [ 554.360438] __should_failslab+0x115/0x180 [ 554.364700] should_failslab+0x5/0xf [ 554.368421] __kmalloc+0x2ab/0x3c0 [ 554.371970] ? ext4_mb_init+0x92/0x1790 [ 554.375942] ? ext4_commit_super+0x6f1/0xb70 [ 554.380786] ext4_mb_init+0x92/0x1790 [ 554.384625] ? ext4_setup_super+0x5f3/0x9f0 [ 554.388945] ext4_fill_super+0x7308/0xc820 [ 554.393200] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 554.398299] ? snprintf+0xbb/0xf0 [ 554.401753] ? wait_for_completion_io+0x10/0x10 [ 554.406403] ? set_blocksize+0x163/0x3f0 [ 554.410450] mount_bdev+0x2fc/0x3b0 [ 554.414058] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 554.419157] mount_fs+0xa3/0x30c [ 554.422523] vfs_kern_mount.part.0+0x68/0x470 [ 554.427000] do_mount+0x113c/0x2f10 [ 554.430637] ? copy_mount_string+0x40/0x40 [ 554.434873] ? copy_mount_options+0x1da/0x380 [ 554.440307] ? copy_mount_options+0x1ec/0x380 [ 554.444792] ? copy_mount_options+0x26f/0x380 [ 554.449294] ksys_mount+0xcf/0x130 [ 554.452819] __x64_sys_mount+0xba/0x150 [ 554.456796] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 554.461362] do_syscall_64+0xf9/0x620 [ 554.465161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.470945] RIP: 0033:0x46090a [ 554.474135] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 554.493831] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 554.501529] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 554.508791] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 554.516071] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 554.523347] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 554.531395] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 554.542941] EXT4-fs (loop3): failed to initialize mballoc (-12) [ 554.549734] EXT4-fs (loop3): mount failed 14:47:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) lseek(0xffffffffffffffff, 0x0, 0x1) 14:47:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xe00, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000080)="22929d7a32ba7f2ca91068752248b73f6817fac6abb7c6034d5e58feff0e9d32c1000d798a1de0e92cea75919d041a671e0d46a2fefcc97a70745c7aac805438fa863fb42e7e60a1c56dd6bc882ad064217b8ad54203d9a8c6", 0x59}, {&(0x7f0000000340)="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", 0xffffff55}], 0x2, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f0000000580)=0x7) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000040)={&(0x7f0000000100)="59ab6af7198d899c665e8f3b03785fb666a0a32babafecef88eee16b5b10da716e000000000000000074350332130f81215437bce8db467daf05ae4230f2685e75679c48688bca031fe0682191801acfe1334db34c296e500ef8f1bcc7b2099819dbea374e143ce5b69ff23e4b83b20336fdb6e19002740020b3b3bab52284e8af23240c953a81892b91ad164929e3827f9b292a057119f1c5b9d5efed90c49b23f549d948390c41eb9ce77eab87c5d003a4b65b1b648ec10207a5b98da8a9b1436ebcd91f67df00ce0e3ef094a30c93", 0xffffffffffffffa1}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x7, @ipv4={[], [], @multicast2}, 0x5}}, 0x10001, 0xefb5, 0x5, 0x3, 0x401}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000004c0)={r4, @in6={{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x12}}}}, 0x84) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xeb) 14:47:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:58 executing program 3 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xf00, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) lseek(0xffffffffffffffff, 0x0, 0x1) 14:47:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x6, &(0x7f00000001c0)="60486df58a54c5a303a9155cd365601577f92332e05bacd8c7c0b86250f01a9791789b0cd363a438f053748bf5be0ee31f4dd6530f92e63ab570dddbbdcea446e241fd2a88ce7259eb2f80a16c5b74766e54eb11ffd572ee9905c87e88cc8e9f33acc88cdb4fea57ce6b7b01edcaae69042ae45e2bad430822f44eb4c4541f89a26ab9bee79cc33281bf618877eee12be806f2ad356838b1d622882e1e36840a30728176cf994f3a4c21c9bcaaeeb84d0a5d5345660a6b43495b70f40f11a7c692db6969f34a769271b24d64d6e218965c92f994e45a059fe3aa9687e80fd49b2c24a412673cf86f0f0cabfe2e99e6b9fb6158ea1c13a46ef7510825030463") [ 556.990211] FAULT_INJECTION: forcing a failure. [ 556.990211] name failslab, interval 1, probability 0, space 0, times 0 [ 557.011164] CPU: 0 PID: 20292 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 557.019078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.028460] Call Trace: [ 557.031711] dump_stack+0x1fc/0x2fe [ 557.035341] should_fail.cold+0xa/0x14 [ 557.039232] ? setup_fault_attr+0x200/0x200 [ 557.043573] ? lock_acquire+0x170/0x3c0 [ 557.047537] __should_failslab+0x115/0x180 [ 557.051757] should_failslab+0x5/0xf [ 557.055461] kmem_cache_alloc+0x277/0x370 [ 557.059604] add_system_zone+0x10a/0x4e0 [ 557.063660] ext4_setup_system_zone+0x1c0/0xac0 [ 557.068325] ? ext4_commit_super+0x6f1/0xb70 [ 557.072725] ? ext4_exit_system_zone+0x20/0x20 [ 557.077321] ? ext4_setup_super+0x5f3/0x9f0 [ 557.081637] ext4_fill_super+0x72e0/0xc820 [ 557.085870] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 557.090959] ? snprintf+0xbb/0xf0 [ 557.094400] ? wait_for_completion_io+0x10/0x10 [ 557.099063] ? set_blocksize+0x163/0x3f0 [ 557.103127] mount_bdev+0x2fc/0x3b0 [ 557.106778] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 557.111875] mount_fs+0xa3/0x30c [ 557.115230] vfs_kern_mount.part.0+0x68/0x470 [ 557.119725] do_mount+0x113c/0x2f10 [ 557.123360] ? do_raw_spin_unlock+0x171/0x230 [ 557.127854] ? check_preemption_disabled+0x41/0x280 [ 557.132855] ? copy_mount_string+0x40/0x40 [ 557.137085] ? copy_mount_options+0x59/0x380 [ 557.141698] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 557.146698] ? kmem_cache_alloc_trace+0x323/0x380 [ 557.151525] ? copy_mount_options+0x26f/0x380 [ 557.156003] ksys_mount+0xcf/0x130 [ 557.159547] __x64_sys_mount+0xba/0x150 [ 557.163514] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 557.168079] do_syscall_64+0xf9/0x620 [ 557.171952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.177131] RIP: 0033:0x46090a [ 557.180343] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 557.199243] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 557.206942] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 557.214196] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 557.221567] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 557.228819] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 14:47:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:47:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x5303, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) statx(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000040)) lseek(0xffffffffffffffff, 0x0, 0x1) [ 557.236084] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 557.261356] EXT4-fs (loop3): failed to initialize system zone (-12) [ 557.280327] EXT4-fs (loop3): mount failed 14:47:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x6000, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:47:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) 14:47:58 executing program 3 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:47:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xf000, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 557.491871] FAULT_INJECTION: forcing a failure. [ 557.491871] name failslab, interval 1, probability 0, space 0, times 0 [ 557.509155] CPU: 0 PID: 20327 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 557.517070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.526426] Call Trace: [ 557.529025] dump_stack+0x1fc/0x2fe [ 557.532665] should_fail.cold+0xa/0x14 [ 557.536556] ? setup_fault_attr+0x200/0x200 [ 557.540870] ? lock_acquire+0x170/0x3c0 [ 557.544843] __should_failslab+0x115/0x180 [ 557.549065] should_failslab+0x5/0xf [ 557.552786] kmem_cache_alloc+0x277/0x370 [ 557.556929] add_system_zone+0x10a/0x4e0 [ 557.561016] ext4_setup_system_zone+0x1c0/0xac0 [ 557.565764] ? ext4_commit_super+0x6f1/0xb70 [ 557.570173] ? ext4_exit_system_zone+0x20/0x20 [ 557.574856] ? ext4_setup_super+0x5f3/0x9f0 [ 557.579174] ext4_fill_super+0x72e0/0xc820 [ 557.583423] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 557.588516] ? snprintf+0xbb/0xf0 [ 557.592112] ? wait_for_completion_io+0x10/0x10 [ 557.596773] ? set_blocksize+0x163/0x3f0 [ 557.601020] mount_bdev+0x2fc/0x3b0 [ 557.604784] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 557.609925] mount_fs+0xa3/0x30c [ 557.613284] vfs_kern_mount.part.0+0x68/0x470 [ 557.617779] do_mount+0x113c/0x2f10 [ 557.621426] ? copy_mount_string+0x40/0x40 [ 557.625703] ? copy_mount_options+0x190/0x380 [ 557.630183] ? copy_mount_options+0x1ab/0x380 [ 557.634859] ? copy_mount_options+0x26f/0x380 [ 557.639371] ksys_mount+0xcf/0x130 [ 557.642912] __x64_sys_mount+0xba/0x150 [ 557.647021] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 557.651600] do_syscall_64+0xf9/0x620 [ 557.655396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.660589] RIP: 0033:0x46090a [ 557.663835] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 557.682737] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 557.690432] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 557.697712] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 557.704984] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 557.712247] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 557.719510] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 557.730116] EXT4-fs (loop3): failed to initialize system zone (-12) [ 557.736643] EXT4-fs (loop3): mount failed 14:48:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0xffff, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r3, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r5}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) fanotify_mark(r1, 0x1, 0x2, r0, &(0x7f00000001c0)='./file0\x00') r6 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x1) 14:48:01 executing program 3 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:48:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10a) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x80000000000000, 0x0) 14:48:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 560.015392] FAULT_INJECTION: forcing a failure. [ 560.015392] name failslab, interval 1, probability 0, space 0, times 0 [ 560.046689] CPU: 1 PID: 20348 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 560.054640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.064043] Call Trace: [ 560.066644] dump_stack+0x1fc/0x2fe [ 560.070286] should_fail.cold+0xa/0x14 [ 560.074184] ? setup_fault_attr+0x200/0x200 [ 560.078515] ? lock_acquire+0x170/0x3c0 [ 560.082537] __should_failslab+0x115/0x180 [ 560.086773] should_failslab+0x5/0xf [ 560.090478] kmem_cache_alloc+0x277/0x370 [ 560.094734] add_system_zone+0x10a/0x4e0 [ 560.098780] ext4_setup_system_zone+0x209/0xac0 [ 560.103437] ? ext4_commit_super+0x6f1/0xb70 [ 560.107837] ? ext4_exit_system_zone+0x20/0x20 [ 560.112405] ? ext4_setup_super+0x5f3/0x9f0 [ 560.116728] ext4_fill_super+0x72e0/0xc820 [ 560.120967] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 560.126057] ? snprintf+0xbb/0xf0 [ 560.129515] ? wait_for_completion_io+0x10/0x10 [ 560.134166] ? set_blocksize+0x163/0x3f0 [ 560.138215] mount_bdev+0x2fc/0x3b0 [ 560.141826] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 560.146913] mount_fs+0xa3/0x30c [ 560.150266] vfs_kern_mount.part.0+0x68/0x470 [ 560.154761] do_mount+0x113c/0x2f10 [ 560.158373] ? lock_acquire+0x170/0x3c0 [ 560.162333] ? check_preemption_disabled+0x41/0x280 [ 560.167336] ? copy_mount_string+0x40/0x40 [ 560.171553] ? copy_mount_options+0x59/0x380 [ 560.175958] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 560.180993] ? kmem_cache_alloc_trace+0x323/0x380 [ 560.185822] ? copy_mount_options+0x26f/0x380 [ 560.190476] ksys_mount+0xcf/0x130 [ 560.194013] __x64_sys_mount+0xba/0x150 [ 560.198064] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 560.202629] do_syscall_64+0xf9/0x620 [ 560.206439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.211636] RIP: 0033:0x46090a [ 560.214831] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 560.233724] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 560.241431] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 560.248689] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 560.255954] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 14:48:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_mount_image$ubifs(&(0x7f0000000200)='ubifs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="e4e03b69d2476a637715555f9f31e70395dc1a25fd23ea665b7e93489b360da7b740c99caf22dd5b5b9db41faf16f4cf885bb454f3229c5bb831c760165e2281a282ba7ea1a4be91aaaaa9621a3b6d66b5b051780ac4f6eaf10fd4c1087377df4b7f138eda261e0fd3a4c33a", 0x6c}, {&(0x7f0000000300), 0x0, 0x9}], 0x100a092, &(0x7f0000000380)={[{@chk_data_crc='chk_data_crc'}], [{@euid_lt={'euid<', r4}}, {@obj_user={'obj_user', 0x3d, 'sysv\x00'}}]}) r5 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r5, 0x0, 0x1) 14:48:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x2, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 560.263217] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 560.270469] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 560.282432] EXT4-fs (loop3): failed to initialize system zone (-12) [ 560.289408] EXT4-fs (loop3): mount failed 14:48:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x3, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:01 executing program 3 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:48:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x4, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 560.445921] FAULT_INJECTION: forcing a failure. [ 560.445921] name failslab, interval 1, probability 0, space 0, times 0 [ 560.463525] CPU: 1 PID: 20381 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 560.471434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.480790] Call Trace: [ 560.483508] dump_stack+0x1fc/0x2fe [ 560.487153] should_fail.cold+0xa/0x14 [ 560.491059] ? setup_fault_attr+0x200/0x200 [ 560.495486] ? lock_acquire+0x170/0x3c0 [ 560.499483] __should_failslab+0x115/0x180 [ 560.504249] should_failslab+0x5/0xf [ 560.507972] kmem_cache_alloc+0x277/0x370 [ 560.512131] add_system_zone+0x10a/0x4e0 [ 560.516211] ext4_setup_system_zone+0x209/0xac0 [ 560.520896] ? ext4_commit_super+0x6f1/0xb70 [ 560.525481] ? ext4_exit_system_zone+0x20/0x20 [ 560.530050] ? ext4_setup_super+0x5f3/0x9f0 [ 560.534361] ext4_fill_super+0x72e0/0xc820 [ 560.538593] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 560.543856] ? snprintf+0xbb/0xf0 [ 560.547314] ? wait_for_completion_io+0x10/0x10 [ 560.551974] ? set_blocksize+0x163/0x3f0 [ 560.556121] mount_bdev+0x2fc/0x3b0 [ 560.559826] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 560.564930] mount_fs+0xa3/0x30c [ 560.568311] vfs_kern_mount.part.0+0x68/0x470 [ 560.572817] do_mount+0x113c/0x2f10 [ 560.576432] ? retint_kernel+0x2d/0x2d [ 560.580325] ? copy_mount_string+0x40/0x40 [ 560.584756] ? copy_mount_options+0x1cd/0x380 [ 560.589249] ? write_comp_data+0x6/0x70 [ 560.593223] ? copy_mount_options+0x26f/0x380 [ 560.597708] ksys_mount+0xcf/0x130 [ 560.601348] __x64_sys_mount+0xba/0x150 [ 560.605345] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 560.610069] do_syscall_64+0xf9/0x620 [ 560.613863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.619042] RIP: 0033:0x46090a [ 560.622219] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 560.641110] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 560.648808] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 560.656063] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 560.663319] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 560.670599] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 560.678306] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 560.689119] EXT4-fs (loop3): failed to initialize system zone (-12) [ 560.695593] EXT4-fs (loop3): mount failed 14:48:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r5, 0x0, 0x1) 14:48:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x7, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:04 executing program 3 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:48:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x2, &(0x7f0000000100)="2112a5061ead7b71f7e0ddde9e98d525d212c066ddf2c15054d5751a2326fa26be3886b533cb9033a17de335f7e6f676ea4f737b536ef3aa553107a90db19f220144db9b3dfcbb27e924f41e51571326ee84242d3d8509bc122438cb46182c175e04180761b315cd07097910e56f6b046792d6558436ae48ce748c560231ae8906bc2325be52da709c6b61b7a6142997a7dc7f6bf7ee39c531abe5967fb0644e398e673a99d8df4d06627d5b06f45b50c442d1adae1830383a0432af") ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x1000, 0x3b, 0x81, 0x1, 0x9, 0x3, 0x8, {0x0, @in6={{0xa, 0x4e22, 0x9, @loopback, 0x9}}, 0xff, 0x3, 0x7fff, 0x3210, 0x3}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={r0, 0x800, 0x3, 0x40}, 0x10) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 563.044761] FAULT_INJECTION: forcing a failure. [ 563.044761] name failslab, interval 1, probability 0, space 0, times 0 [ 563.081461] CPU: 1 PID: 20403 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 563.089384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.098836] Call Trace: [ 563.101441] dump_stack+0x1fc/0x2fe [ 563.105091] should_fail.cold+0xa/0x14 [ 563.108994] ? setup_fault_attr+0x200/0x200 [ 563.113322] ? lock_acquire+0x170/0x3c0 [ 563.117311] __should_failslab+0x115/0x180 [ 563.121572] should_failslab+0x5/0xf [ 563.125295] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 563.130411] __kmalloc_node+0x38/0x70 [ 563.134223] kvmalloc_node+0x61/0xf0 [ 563.137952] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 563.142757] ext4_mb_init+0x985/0x1790 [ 563.146651] ext4_fill_super+0x7308/0xc820 [ 563.150910] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 563.156070] ? snprintf+0xbb/0xf0 [ 563.159513] ? wait_for_completion_io+0x10/0x10 [ 563.164167] ? set_blocksize+0x163/0x3f0 [ 563.168216] mount_bdev+0x2fc/0x3b0 [ 563.171845] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 563.177052] mount_fs+0xa3/0x30c [ 563.180631] vfs_kern_mount.part.0+0x68/0x470 [ 563.185237] do_mount+0x113c/0x2f10 [ 563.188853] ? lock_acquire+0x170/0x3c0 [ 563.192884] ? check_preemption_disabled+0x41/0x280 [ 563.198007] ? copy_mount_string+0x40/0x40 [ 563.202227] ? copy_mount_options+0x59/0x380 [ 563.206623] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 563.211637] ? kmem_cache_alloc_trace+0x323/0x380 [ 563.216491] ? copy_mount_options+0x26f/0x380 [ 563.221067] ksys_mount+0xcf/0x130 [ 563.224643] __x64_sys_mount+0xba/0x150 [ 563.228797] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 563.233455] do_syscall_64+0xf9/0x620 [ 563.237243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.242414] RIP: 0033:0x46090a [ 563.245591] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 563.264496] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 563.272192] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 563.279445] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 563.286726] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 563.293979] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 563.301233] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 563.327648] EXT4-fs (loop3): can't allocate buddy meta group [ 563.333683] EXT4-fs (loop3): failed to initialize mballoc (-12) 14:48:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x8, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x1) 14:48:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="cda7644e9ee46955857597ea5fc1e5aeb1da345e407c5a8727c3e23e80cbdfaa34585684b63624ff117a9177c7e53392e782f34f001a143c30b72c77530101249b7aa085ba5bf8fa4be53109d2e8135149e110726fe07854b8ae2553ad7aa6feefbdcf8e6c698999c0d25d67ebe677ac3500"/123, 0x7b, 0x10, &(0x7f0000618000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='A\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={r0, 0xc1d9, 0xfffff4a0, 0x4}, &(0x7f0000000140)=0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000200)="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", 0xff}, {&(0x7f0000000300)="e92232708e2e6775c282fb6757f325319b97114835560d5e7f31e99ea810bdae9b26614b8259a2d56fc5aa740c43aa5e72063c516b08ddca0fce16c8cf1e0d2f1c1e0364662047ffe5f89350b8817860b9d978a85a6dda9b57ed63762573bd7b6dd25a670c9ed6c8dc5b22da564475edcbcbb6da1a5ecbce7099f3fabaa58674f256ded19dae4b312724ff3700e0", 0x8e}, {&(0x7f0000000080)="b199a9e39e1b4b7782", 0x9}, {&(0x7f0000001140)="aba8d4d3bf40a605f892818a841ea8b9796ff2d2bd6a783e0498794b9a45cf95f0bdc3890281d023f50535e425e7ea17cc8edf264146b6efdcaf5f8956b93cc4f05d43cbbfaac4830e053124761694f15fcec70284ffff290d32a55638c808ef3b3943097d0f0fdbae2f68ab8f61fabf5e57eb574ea9033773f74d6a067a543914376b56ee2e56bffd3e1f178d594f1eb07b85891cdbc617b30968b11d049f3f672ae6653772eb14c90154a67104c4fc742bf172100dd928d5c3aa79d0aacc4ff666594a4ca6465f06df761b63ec8b403d92961d70ae9308e4e539c248bacd55c475f4b082344aff8309b76490300e800099b8a36cf7fb88bae77e3d2002649cecab58a6274d620a7b1eb052f566d36ca73656b295ce9dc9c44a488c1cce1f03ec811d6163a67c210cc4c30be05fed8c118486f54c8e0d7f0461546773c279be1d6ceaf35a8cfa72796d830103f806a41c69955caee265d639badf1a74da0b4cac0d8c2000318dd0bd253902a2db69c498afff9523758dc10f9030b31b06a8ce438c9ee6280c7be0aeeafcbec5baf86575b307baa08b9f1fb7b2d4be58c50af8920685df8b572a282e9dd7a71f4d6d7a1b85c17ec7dd458d73733a8d226e4da80a031513a4819b07904b862d743802bf752702f15c95dc9d6d655fa70402959bfdeb2dbd7ebb31edaaba54ff6dbcc710ff22e7faecd3a053dd4d18867a58002d8e2fb6d6a6d05d1bd0bacc76d170bbe5144d64321ed0a7d0e516759eb56b8b462a22a4290cfcdb3ba08c26a3aef7246478d94ce8183ec0daecda355dffdb1a92128576ddd41d2bbcca35897967abc25a2f07759b8d036f988ec5e5055557cdb24cf13c559d55e75e69bb4563391d9384bc9edf4a8b786f92693771d44771715a825c380217f49882c64475569b051e745c22b3df2cdefc57900d745278017fe8c2b87fc664650fad24e8d74bd5ecb669c6590909df8a80385ad3f40f70273ca8b35f8f3f8dd7b9f3bddb1fc9ee1c2dac00f55a63bda8b80ffeddb58da8c97116f7e07df020b255d9db8c7dec015420461683754a9944d3e5f6126b72030cfc2f3be6871f6dd7e8695531f48a8a3f5574597fa2c6e480f933df7b339d219ebfb14b6e98b1d8652faeb05b32d98b40acc8d8c14014d8a005bf20d94f6f5e7c4ce9d96d8acf1d633d44e4a43ec58d0d5c1a2ccb29e3d5cfa6e6a34973a97bcb47ae0588ad9ce9ef0eeab63f17da6c28c475e9a3a3d1243a1faca8b148613258208006d90043f008997c562d42523435fe82de0952859125739de31aace81814c33be047160d6b275176c5140f774a7fa59c5258152ea9ca3b486703034c25e03963775279093a6c5b3d5e94d696ebdaecd558b3f5b2b41a98c884ee8f3acf97ea70389edb8270398967fafa9c7a47a12ee6c9ff9b1e7bbfd20c8caf4bd5b20b4cb24d9b6200a1c46d0183ceba8bbf718617b5fd644ffdb2655bdd8fbe16f8d8e860776e93464880878a7e65a8a8d5235e35d94d60f446b4029c13100337db20dba9b4057ebed0098daf7a75d9bc2b268d4c0bc16877a3bdb61a91fd2ab91e8d3bea4ae2a2d0b433eb76a170bf441936b05cfc6abacc6c91c0f3012cddcd46f76fee988dccafcdff75bf38ce55f75857bd985a53c11881b1e286568b8a412d4fc8110754e726a3bde13ed26d941394db6ef34255e3a310dbc0e03baa1a65cf1831f28d8eadb2839128a504ad673c69b965f502569c0581aafec574cf691d085c346f3191b50ca64d9c5f0df9452a40ee0b4793eb7e08616c901a756e4d147cc78af09f48c5ff838b6df6f564fa20c26875120b56a5418b21fcc8d577de2ab3fb1a3a77443cf226b6a52336fc59ad322584e855d1d150ef0090866834f2517147395515563e80a79c8edd2990fc048bfc67f22c2a501803a3ef83c2e6e7ddc92755c83293e0d54f8b270b4c8687b5f874019469eca98750ad67caf2d40de1e3d9e8fccb941b93329c3f714e3405680df2c047b0d8a2a44fd3bf9699883db373a5409605e422df7cbff5c62a9551184f8a69f4dd3038bcf549a3858745160fdedb8a747cf0f2cc931fc6761f5385868e938e1b96315fd1eda33dd0564c0e99958a396bce029a8d0d1a2655f2b7229d5307de1379841647311aea807ab9e25d3e0429ec8eaaf9e92fb2e2562e85e698932263dc48b4776ec9bfd4d5faf9b02000fcccec65855fe0ade75f5a5dab0dc9059fd172ed6cf7f00cbf7f2911c53729441d96bd873154418979688a8104af3af29f2d0354b075ba407aa91b8d7566ae0fd8aeb48e8e2af1dc70a572517d71a64e503f0ac697e2dd88b4e6049b0a9c7f8de1d47902fd33f108d838e6309b7ce304410ec14a2b89624834395281526be189e99c744d2f9772aedc82390b724469da00f14c576d5cc59c32da87c3554e70a58a74b3d68000ecf0e1c045f6478a30468f3786de37bd5f5d5412c8a3fd21cb7efd8126a963e02dd06362759fac4466f0522294be901b1b3ef0a07de17cf950ed1b19e56760aaba041258bced0ecd7638adf86c42724e0ac5f0921e0148eab5b1c515f06af667fafff265d882613519d966f1ce42028be08babacd42ac6c91625390f0304a3799d3da91e8d2356ef781750642aa90539b5ae1a93ddf9cf182b017c90cd4c1ab0f945ad709e7f8895281784ebba0a33d0b613d8397ae92fa824a2698ab74f028909942dd81d01f4b7cfa512c9294ad44d22f2985ea01a22ecee2a3e97241889ac31fed61263e37e56f7ddf1dbc89e9e479a159d60451ff24f0e912fc924df3843ab50c33e260d4b0a47e4a71fdea07f07519a57abb21904286e0a2f8c021bfacaeffc9dc561fca8662fbd3e4532fe4b0830008ff9fcfddd60b70b30e82879e17097db33b7cb12329448da560ff6169f1da003a898e002031eab51c221755d353fe1298b66b27286cf78483fe0ac22cac8549e3dc2bc2590facba313d1c0d1dc8f98fbb1019e8c4c641c1e034c88871beaaab82829984705b42e7d413cf3d4a2ef69689171c162e068ac4e6459d982c3897ab919826b982fa89624e47151406a147d9d73329625f7f9adc473dc782446f396c91457e9e3391dfbed3ccf505b9f16d79b5a23e0a4c95ddf8d5842ecd58e43ecaba8f2a0d8492d66cf8ba56957c98f230bbb0fb2c291999e5ed13a8fbcc216cb6037c8d930aaca9828b82021dbd3710f29d23ddc4e96e72daf18f0d62ea45c132435ef47b36789ef1859b3926196bdb70d83c9056f42463ab7fd7d4096d5a60ccab5bb7a2060a33ad34e0ae677178c0d81c4ed8e278d34643b894900ac1a949c363b5309af93514d75ca66890f02f799b801b2616869f7eb1dc6a79051ecf8ce899c2ee21a859c513737e9b4e831d5efbd10e416a6147beddc75ad7e6522acb459fbaf720a4c9519716355c3cfe9be896c1ef205cdce4982fc16b2b353cb4a9f294a475c5dee0d1ee6d376e01b9de4313fe7a17a40d3b1354b516679559555c4f22f371dafbdf55f5c1d268e078687889a1c4671286e7144ebbb46b09d2780a3fb4435f8e26ab53b07e988899245ccabf93855cacee87a70aaf1e26bf628f563a8877257ff3a84126b473d085fdad65bea3799d2c50a5e67e0f4225230a830d3556ec9e9f8be50d86981225d78da81f7d008dbc8c62aa887e1f22dab667e6826642d76079250fb3e93c78b64fa77099139fc9d4fb215c20f8cbafd65d41833f829b1fdb03fc821031c06ef2072c184d40140674115afce76a8472e005405d2d99755f1e71ac4c0cdb0fdeb0ab3a404d63fc0ad21f8d9c5de595110778e973e5cc62fda1796c899ed96ced68390e36445512ae8d3a9c20b2c21335bfdfc06479c596980e880f5012f7688453a1b45ffbd5663f19afd186944c4b5f7a852900141a21d87dfa0d10495295c0c861ab2a51e162edb5befdb177aaee361adcf85dc95bf51223803ece367ac7a423e0a0d0091bdcc6817215c1a126bae331396a3c78103dcd7711bf2702ef2865e7a1cc0cb3c8e64208c7a915dafa9a410de1f8fa5e12f99e20c7390c2d0400214087ed78e91f8a209c59d7a7daa57849eba09578a2dc7294350b73c05da683f4d5efb92cf417cf2b76cf28502d901994786f619ce4e89bcbb87a1b8e9a2c5b32da517e013539d84e318744f29fb56f9fe972548413a1293ca5cb44a273ba9bfdb207a8630f65d799142818db3b7b43d5f287089b1ede17f0c0359451443640be7442fd1f504ad3e8026fcfbe2dda52306ab5cc8f959b805d5fbe79331daa71979c691111a6e5f942255adea5401acdb1060526451cf685e8a394afdf9fe4d24c47d4ab4b71b7d61cb630bb5212fb912f398d35fd2f2c0f5e918d417bb7630913d3a9a1e2b629e4a4d00df8d375ce93936fca29c64c780c45d02f630cc6598322da224ec3a9e1a8463b0f4ed016dc2236d0b31733a37196bf908ff228ce9f2958cfe95dfb3746560fb085a15a3e6cf8b917e062b6525af45dbaf2b435e6c5a23f6c06077109f57658581b24a40cb95f25e942480077881148b76696f8dbdc3e25ef80e2ed97b36afe27d727759b3f6a624b038ae7e59a85b29d00ba391cfbda45ed1eaf55db32d49c022b227bcbd8a920b3c4a01aa8d5a9e259bebbdc892db902eba4f619f39196627ced5ac728a2cb791075ed06ee19d3aacb91d46d7ead0835fa143b6aaa2f9503134fb552a1b31a922c08491501185fd494c580ce497b7fe4d0fddd21d2856b18fe6303e5b7f2c27398fcb9b5fcd7f262aeed2e42360b9f6bf51ae48ba7af55c1f4dde0eaa7a48f9dffd280081f9f03dbc679cd854ade8056178183105f80381821b651a35f79725a823a15c61b7513cd117facb44966c2d06ae3fd267f48acfd2554089f308106a02164f065840383a72f812751a81cdaafadd6bb312001a8bd929f0e71ae541619c6750995ca0a479ff9aba7751c2f343051f4208effb4c5fc81c560d7c9269052a54eab844e770e8d162da9cca8171b838231c5d5548113eb799ea14b81e8cd9275303919bb1cce4c3dc18fde71c4a07d80c8d8fc6cc5a2e7c2d46d0fd8b282fabd02af4a38c2206548a7910988e2619ed51917996fd4f052346473aea8ababea9aad8d62bd62d2bad767a61180299a6eecba0e609bf61a27bd7d826e5cf3cc95612b5001723d880966a4bd80df89f0c772ab1e01cfe5abca0c71cbd080dc0db9d35d7ea24c6eeec9a573220916689d4604242ccbfff029e3cb1a431282dcfa329a84aa399e8b8e7d2c9860cee8b3b3d0d260289a573c49cea67e613e3dda53bb52c51a6ea2b6b1393d94c7cd00c7ace5f3146030ec100a0825aaf5d5d214e85c20c4ba82d9e41280ff360b47ad6b660c58bcbfb579b4df66984ac1b685f74d04c5da324d5d75c9db4200978d27c00ead23682dc0dd260af62355371b1ddc36eb810ba0ce96f2784ff88d0d8a0bb2f860195c688a8d1d6e32806b236cd2321325537533c07f09b75a00f030fcdc61ae978f90b7810453c54fa8323ecec45ba2bad4d9b0fc7a7f90d5b981db011b5529b6b99c860a311730ab491bf75f33fa1c1ccfbbb01f1a2fba408f8d40154c00c0eeb7b07f5137a787ed3ca958da0bd8dc3642cdea19a3e252c8d0f95c791e1238ff4d8f1051e8e45d835b0d7308736851b3b3627848395b0810387403ac1cbe207b3ce5d569eedadee2ef8f38174683223f2018ea8ba5ffed2b87c26f3f4ca4e543302deb39cb76e137e4f7c53bc8a40b8761591243b90d5bfee7bf9c79d35096fadb8", 0x1000}, {&(0x7f00000003c0)="ef6235c7a407245d13dd9d5222cfdf7db14c60491cada534a421c88efa19aa0735ceefa0", 0x24}, {&(0x7f0000000400)="6a09c05adbeb4e0a7018b9a74603a37cb73edb59557294a984192e530e8b24bc2e599f423c7b8ba629dc2a003012810a09374d92373bdc62db22d5753ba2691b3c39e5fe6c968e6cedc617c7", 0x4c}], 0x6, 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000001100)=0x1) ioctl$PIO_FONTRESET(r2, 0x8925, 0x20000000) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000000)={0xa0000000, 0x10000, 0x2, 0xfffffffd, 0x3}) ptrace$cont(0x18, r1, 0x0, 0x0) [ 563.344962] EXT4-fs (loop3): mount failed 14:48:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r3 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x1) 14:48:04 executing program 3 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) [ 563.490218] FAULT_INJECTION: forcing a failure. [ 563.490218] name failslab, interval 1, probability 0, space 0, times 0 [ 563.505070] CPU: 1 PID: 20446 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 563.513411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.522768] Call Trace: [ 563.525371] dump_stack+0x1fc/0x2fe [ 563.529021] should_fail.cold+0xa/0x14 [ 563.532961] ? setup_fault_attr+0x200/0x200 [ 563.537726] ? lock_acquire+0x170/0x3c0 [ 563.541720] __should_failslab+0x115/0x180 [ 563.545962] should_failslab+0x5/0xf [ 563.549680] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 563.554796] __kmalloc_node+0x38/0x70 [ 563.558606] kvmalloc_node+0x61/0xf0 [ 563.562330] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 563.567096] ext4_mb_init+0x985/0x1790 [ 563.571012] ext4_fill_super+0x7308/0xc820 [ 563.575283] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 563.580494] ? snprintf+0xbb/0xf0 [ 563.583965] ? wait_for_completion_io+0x10/0x10 [ 563.588648] ? set_blocksize+0x163/0x3f0 [ 563.592728] mount_bdev+0x2fc/0x3b0 [ 563.596452] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 563.601570] mount_fs+0xa3/0x30c [ 563.604941] vfs_kern_mount.part.0+0x68/0x470 [ 563.609426] do_mount+0x113c/0x2f10 [ 563.613047] ? do_raw_spin_unlock+0x171/0x230 [ 563.617547] ? check_preemption_disabled+0x41/0x280 [ 563.622554] ? copy_mount_string+0x40/0x40 [ 563.626776] ? copy_mount_options+0x59/0x380 [ 563.631248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 563.636264] ? kmem_cache_alloc_trace+0x323/0x380 [ 563.641097] ? copy_mount_options+0x26f/0x380 [ 563.645707] ksys_mount+0xcf/0x130 [ 563.649782] __x64_sys_mount+0xba/0x150 [ 563.653745] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 563.658312] do_syscall_64+0xf9/0x620 [ 563.662219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.667403] RIP: 0033:0x46090a [ 563.670596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 563.689571] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 563.697266] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 563.704527] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 563.711787] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 563.719121] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 563.726385] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 563.738831] EXT4-fs (loop3): can't allocate buddy meta group [ 563.744792] EXT4-fs (loop3): failed to initialize mballoc (-12) [ 563.758619] EXT4-fs (loop3): mount failed 14:48:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c5995", 0x61}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0xe, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x3) r3 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x1) 14:48:07 executing program 3 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000040)={[{@noload='noload'}]}) 14:48:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)={0x1c, r2, 0xf15, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r3 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x1) 14:48:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0xf, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) [ 566.067000] FAULT_INJECTION: forcing a failure. [ 566.067000] name failslab, interval 1, probability 0, space 0, times 0 [ 566.124635] CPU: 1 PID: 20466 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 566.132565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.141928] Call Trace: [ 566.144531] dump_stack+0x1fc/0x2fe [ 566.148174] should_fail.cold+0xa/0x14 [ 566.152073] ? setup_fault_attr+0x200/0x200 [ 566.156409] ? lock_acquire+0x170/0x3c0 [ 566.160403] __should_failslab+0x115/0x180 [ 566.164681] should_failslab+0x5/0xf [ 566.168403] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 566.173513] __kmalloc_node+0x38/0x70 [ 566.177321] kvmalloc_node+0x61/0xf0 [ 566.181048] ext4_alloc_flex_bg_array+0x1b8/0x620 [ 566.185908] ext4_fill_super+0xbddf/0xc820 [ 566.190178] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 566.195293] ? snprintf+0xbb/0xf0 [ 566.198770] ? wait_for_completion_io+0x10/0x10 [ 566.203447] ? set_blocksize+0x163/0x3f0 [ 566.207520] mount_bdev+0x2fc/0x3b0 [ 566.211244] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 566.216360] mount_fs+0xa3/0x30c [ 566.219738] vfs_kern_mount.part.0+0x68/0x470 [ 566.224247] do_mount+0x113c/0x2f10 [ 566.227885] ? lock_acquire+0x170/0x3c0 [ 566.231870] ? check_preemption_disabled+0x41/0x280 [ 566.236900] ? copy_mount_string+0x40/0x40 [ 566.241148] ? copy_mount_options+0x59/0x380 [ 566.245568] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 566.250581] ? kmem_cache_alloc_trace+0x323/0x380 [ 566.255412] ? copy_mount_options+0x26f/0x380 [ 566.260010] ksys_mount+0xcf/0x130 [ 566.263619] __x64_sys_mount+0xba/0x150 [ 566.267606] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 566.272270] do_syscall_64+0xf9/0x620 [ 566.276058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.281252] RIP: 0033:0x46090a [ 566.284602] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 566.303493] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 566.311193] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 566.318799] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 566.326056] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 566.333330] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 566.340587] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 14:48:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 14:48:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 14:48:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0x60, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957a", 0x62}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={r3, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={r3, 0xf3, "eba2b9c7f29dfe02ae714eb9c346275ed78896e0cdabe8277c6679c31652050b8207e4c381eacddbf75dc8e75e93ff6f1db857b75962e22cc9c0221a96f05304eb8fa86335a0da8f3564ef5f0dd3e49985d43090cc3d6e2d863dc2021683ff02f86babce3f9c182128135b70e1216a804528dbbcd23930505816d639bdc91c7a055d7f732d4fa2c3639707a732da93eb34e4242cd8040d8143b8ae07a8aa3a38c156b05a557d52fc8df532ffab2278c8496715908685f88e1838753855e22277396800094dee14c77ebb877127d3ba8f45b30f09ef4ff5099ab709f3f75b2c8aa09b6fbf305eb0c22c53d8cb2038522013fbbc"}, &(0x7f0000000000)=0xfb) [ 566.399223] EXT4-fs (loop3): not enough memory for 1 flex groups [ 566.406116] EXT4-fs (loop3): unable to initialize flex_bg meta info! [ 566.414169] EXT4-fs (loop3): mount failed [ 566.419483] kasan: CONFIG_KASAN_INLINE enabled [ 566.447667] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 566.474274] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 566.480548] CPU: 0 PID: 20466 Comm: syz-executor.3 Not tainted 4.19.161-syzkaller #0 [ 566.488431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.497802] RIP: 0010:mount_fs+0xe0/0x30c [ 566.502045] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 79 91 be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 566.520952] RSP: 0018:ffff8880b3d6fce0 EFLAGS: 00010202 [ 566.526321] RAX: dffffc0000000000 RBX: ffffffff8a0a8980 RCX: ffffc9000c162000 [ 566.533588] RDX: 0000000000000019 RSI: ffffffff81a63e77 RDI: 00000000000000c8 [ 566.540945] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 566.548291] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 566.555552] R13: ffff88809d55e680 R14: 0000000000000000 R15: ffff88809943f000 [ 566.563266] FS: 00007fa358563700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 566.571481] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 566.577372] CR2: 00005634e67fa028 CR3: 00000000a54f3000 CR4: 00000000001406f0 [ 566.584653] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 566.591907] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 566.599159] Call Trace: [ 566.601741] vfs_kern_mount.part.0+0x68/0x470 [ 566.606333] do_mount+0x113c/0x2f10 [ 566.610049] ? lock_acquire+0x170/0x3c0 [ 566.623557] ? check_preemption_disabled+0x41/0x280 [ 566.628571] ? copy_mount_string+0x40/0x40 [ 566.632795] ? copy_mount_options+0x59/0x380 [ 566.637300] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 566.642478] ? kmem_cache_alloc_trace+0x323/0x380 [ 566.647321] ? copy_mount_options+0x26f/0x380 [ 566.651978] ksys_mount+0xcf/0x130 [ 566.655506] __x64_sys_mount+0xba/0x150 [ 566.659467] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 566.664036] do_syscall_64+0xf9/0x620 [ 566.667822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.672994] RIP: 0033:0x46090a [ 566.676178] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 14:48:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in, @in=@multicast2, 0x0, 0xf0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 14:48:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) [ 566.695335] RSP: 002b:00007fa358562a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 566.703054] RAX: ffffffffffffffda RBX: 00007fa358562b20 RCX: 000000000046090a [ 566.710312] RDX: 0000000020000080 RSI: 0000000020000100 RDI: 00007fa358562ae0 [ 566.717572] RBP: 00007fa358562ae0 R08: 00007fa358562b20 R09: 0000000020000080 [ 566.725258] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 566.732526] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 566.739793] Modules linked in: [ 566.753766] ---[ end trace 740e94567c878a38 ]--- [ 566.759844] RIP: 0010:mount_fs+0xe0/0x30c [ 566.764123] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 79 91 be ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 566.803088] RSP: 0018:ffff8880b3d6fce0 EFLAGS: 00010202 [ 566.811921] RAX: dffffc0000000000 RBX: ffffffff8a0a8980 RCX: ffffc9000c162000 [ 566.819979] RDX: 0000000000000019 RSI: ffffffff81a63e77 RDI: 00000000000000c8 [ 566.828490] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 566.835842] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 566.844135] R13: ffff88809d55e680 R14: 0000000000000000 R15: ffff88809943f000 [ 566.852283] FS: 00007fa358563700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 566.861390] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 566.868041] CR2: 0000000000778000 CR3: 00000000a54f3000 CR4: 00000000001406e0 [ 566.875734] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 566.884077] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 566.892225] Kernel panic - not syncing: Fatal exception [ 566.898458] Kernel Offset: disabled [ 566.902071] Rebooting in 86400 seconds..