s(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 188.729106] erofs: read_super, device -> /dev/loop5 [ 188.737928] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 188.749553] erofs: blksize 1 isn't supported on this platform [ 188.752329] erofs: read_super, device -> /dev/loop0 [ 188.761437] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 188.772274] erofs: cannot find valid erofs superblock 05:48:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 188.850706] erofs: read_super, device -> /dev/loop2 [ 188.856787] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 188.870155] erofs: cannot find valid erofs superblock 05:48:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 188.952160] erofs: read_super, device -> /dev/loop3 05:48:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c87"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 188.978179] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 188.999908] erofs: cannot find valid erofs superblock 05:48:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.069911] erofs: read_super, device -> /dev/loop0 [ 189.088518] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.104589] erofs: cannot find valid erofs superblock [ 189.113841] erofs: read_super, device -> /dev/loop4 [ 189.118887] erofs: options -> acl,noacl, [ 189.124216] erofs: read_super, device -> /dev/loop5 [ 189.129922] erofs: read_super, device -> /dev/loop2 [ 189.135662] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.145714] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c87"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 189.166364] erofs: blksize 1 isn't supported on this platform [ 189.173792] erofs: cannot find valid erofs superblock 05:48:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.299383] erofs: read_super, device -> /dev/loop3 [ 189.318713] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.383547] erofs: cannot find valid erofs superblock 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c87"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 189.406066] erofs: read_super, device -> /dev/loop0 [ 189.411280] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.420690] erofs: read_super, device -> /dev/loop2 [ 189.428996] erofs: cannot find valid erofs superblock [ 189.440601] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 189.538358] erofs: unmounted for /dev/loop2 [ 189.547469] erofs: read_super, device -> /dev/loop4 [ 189.560354] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.563509] erofs: read_super, device -> /dev/loop5 05:48:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.609490] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.619936] erofs: blksize 1 isn't supported on this platform 05:48:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.695235] erofs: read_super, device -> /dev/loop0 [ 189.700510] erofs: read_super, device -> /dev/loop3 [ 189.712167] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.719489] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 189.750109] erofs: cannot find valid erofs superblock [ 189.758831] erofs: cannot find valid erofs superblock [ 189.804826] erofs: read_super, device -> /dev/loop2 [ 189.809859] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.820882] erofs: cannot find valid erofs superblock [ 189.842816] erofs: read_super, device -> /dev/loop4 [ 189.850220] erofs: read_super, device -> /dev/loop5 05:48:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.855973] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 189.872968] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 189.919806] erofs: blksize 1 isn't supported on this platform 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 189.973459] erofs: read_super, device -> /dev/loop3 [ 189.973478] erofs: read_super, device -> /dev/loop0 [ 189.983922] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.008515] erofs: cannot find valid erofs superblock 05:48:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.027519] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 190.073943] erofs: read_super, device -> /dev/loop2 [ 190.084554] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.133327] erofs: read_super, device -> /dev/loop5 [ 190.138063] erofs: cannot find valid erofs superblock [ 190.141356] erofs: read_super, device -> /dev/loop4 [ 190.157779] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.168397] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 190.189992] erofs: blksize 1 isn't supported on this platform [ 190.312931] erofs: read_super, device -> /dev/loop3 [ 190.324353] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.333124] erofs: read_super, device -> /dev/loop0 [ 190.342113] erofs: read_super, device -> /dev/loop2 [ 190.342182] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc33"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 190.353156] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.367510] erofs: cannot find valid erofs superblock [ 190.390510] erofs: cannot find valid erofs superblock [ 190.404757] erofs: cannot find valid erofs superblock 05:48:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.506935] erofs: read_super, device -> /dev/loop5 [ 190.512626] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.562875] erofs: blksize 1 isn't supported on this platform [ 190.597388] erofs: read_super, device -> /dev/loop4 05:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc33"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 190.609868] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.656536] erofs: read_super, device -> /dev/loop0 [ 190.661588] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.684578] erofs: read_super, device -> /dev/loop2 [ 190.689634] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.691100] erofs: read_super, device -> /dev/loop3 05:48:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc33"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 190.701909] erofs: cannot find valid erofs superblock [ 190.709043] erofs: blksize 1 isn't supported on this platform [ 190.738722] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.747540] erofs: cannot find valid erofs superblock 05:48:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0), 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.912142] erofs: read_super, device -> /dev/loop0 [ 190.917461] erofs: read_super, device -> /dev/loop2 [ 190.924258] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.934704] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 190.946819] erofs: cannot find valid erofs superblock 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 190.957012] erofs: blksize 1 isn't supported on this platform 05:48:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.033991] erofs: read_super, device -> /dev/loop3 [ 191.034006] erofs: read_super, device -> /dev/loop5 [ 191.039035] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.061053] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.062626] erofs: cannot find valid erofs superblock 05:48:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 191.162128] erofs: read_super, device -> /dev/loop0 [ 191.167217] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.222194] erofs: read_super, device -> /dev/loop2 [ 191.227484] erofs: read_super, device -> /dev/loop4 [ 191.236045] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.237792] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.248550] erofs: blksize 1 isn't supported on this platform [ 191.258715] erofs: blksize 1 isn't supported on this platform [ 191.266516] erofs: read_super, device -> /dev/loop3 05:48:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.279334] erofs: read_super, device -> /dev/loop5 [ 191.292043] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.297942] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e6"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.333215] erofs: blksize 1 isn't supported on this platform [ 191.392435] erofs: unmounted for /dev/loop3 05:48:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e6"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 191.477658] erofs: read_super, device -> /dev/loop0 [ 191.490866] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.509862] erofs: read_super, device -> /dev/loop4 [ 191.518361] erofs: cannot find valid erofs superblock 05:48:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e6"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 191.520103] erofs: read_super, device -> /dev/loop2 [ 191.526114] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.529392] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.539658] erofs: blksize 1 isn't supported on this platform [ 191.552286] erofs: blksize 1 isn't supported on this platform 05:48:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.642806] erofs: read_super, device -> /dev/loop3 [ 191.655736] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.679169] erofs: read_super, device -> /dev/loop5 [ 191.684943] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.686840] erofs: cannot find valid erofs superblock [ 191.704613] erofs: read_super, device -> /dev/loop0 [ 191.709689] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.747643] erofs: blksize 1 isn't supported on this platform [ 191.752837] erofs: cannot find valid erofs superblock 05:48:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 191.823025] erofs: read_super, device -> /dev/loop2 [ 191.826722] erofs: read_super, device -> /dev/loop4 [ 191.828218] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.840174] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.862784] erofs: blksize 1 isn't supported on this platform 05:48:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 191.873650] erofs: read_super, device -> /dev/loop3 [ 191.879079] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 191.890126] erofs: cannot find valid erofs superblock [ 191.905432] erofs: blksize 1 isn't supported on this platform 05:48:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) 05:48:04 executing program 4: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.032571] erofs: read_super, device -> /dev/loop5 [ 192.038592] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.048403] erofs: read_super, device -> /dev/loop0 [ 192.056814] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 192.085900] erofs: blksize 1 isn't supported on this platform [ 192.096177] erofs: cannot find valid erofs superblock [ 192.098374] erofs: read_super, device -> /dev/loop3 [ 192.124213] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.133320] erofs: cannot find valid erofs superblock [ 192.159246] erofs: read_super, device -> /dev/loop2 05:48:04 executing program 4: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.195757] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 192.237457] erofs: blksize 1 isn't supported on this platform [ 192.334706] erofs: read_super, device -> /dev/loop0 [ 192.340044] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.349183] erofs: read_super, device -> /dev/loop3 [ 192.364381] erofs: read_super, device -> /dev/loop5 [ 192.374136] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001100)=""/4095, 0xfff}], 0x1, 0x0, 0x0) [ 192.376825] erofs: blksize 1 isn't supported on this platform [ 192.382913] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.496654] erofs: unmounted for /dev/loop3 05:48:04 executing program 4: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.553182] erofs: read_super, device -> /dev/loop2 05:48:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, 0x0, 0x0, 0x0, 0x0) [ 192.591480] erofs: read_super, device -> /dev/loop0 [ 192.592889] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.606665] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.638792] erofs: blksize 1 isn't supported on this platform 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.714329] erofs: read_super, device -> /dev/loop3 [ 192.728370] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.748591] erofs: cannot find valid erofs superblock [ 192.758182] erofs: read_super, device -> /dev/loop5 05:48:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, 0x0, 0x0, 0x0, 0x0) [ 192.773354] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.795545] erofs: blksize 1 isn't supported on this platform 05:48:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, 0x0, 0x0, 0x0, 0x0) [ 192.903059] erofs: read_super, device -> /dev/loop2 [ 192.908218] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.911910] erofs: read_super, device -> /dev/loop0 [ 192.926025] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) 05:48:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 192.949616] erofs: blksize 1 isn't supported on this platform [ 192.957980] erofs: read_super, device -> /dev/loop3 [ 192.964456] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 192.978235] erofs: cannot find valid erofs superblock 05:48:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.063461] erofs: read_super, device -> /dev/loop5 [ 193.068516] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.078057] erofs: blksize 1 isn't supported on this platform 05:48:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) 05:48:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.187355] erofs: read_super, device -> /dev/loop2 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.208104] erofs: read_super, device -> /dev/loop0 [ 193.210766] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.214069] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.248495] erofs: blksize 1 isn't supported on this platform [ 193.271259] erofs: read_super, device -> /dev/loop3 [ 193.277900] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.293663] erofs: cannot find valid erofs superblock 05:48:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) [ 193.322922] erofs: read_super, device -> /dev/loop5 [ 193.328056] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.338439] erofs: blksize 1 isn't supported on this platform 05:48:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0) 05:48:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.463046] erofs: read_super, device -> /dev/loop2 05:48:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.484532] erofs: read_super, device -> /dev/loop0 [ 193.496024] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.499735] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.535029] erofs: read_super, device -> /dev/loop5 05:48:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0) [ 193.556120] erofs: blksize 1 isn't supported on this platform [ 193.568400] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.571053] erofs: read_super, device -> /dev/loop3 [ 193.582462] erofs: unmounted for /dev/loop2 [ 193.586994] erofs: cannot find valid erofs superblock [ 193.595343] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.608743] erofs: blksize 1 isn't supported on this platform 05:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc) close(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x18010000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a306594ee73e0ab63c442e14cef55194741afd4f5da517b002099485994b8809964b8f616604ec2fce050ce4856ded22b64e26407569b64a94407ee8b838de988e3b3e66553e79dcdde2394c1a5d052cc27dd436839a2e32d2bcf20a439258ce1defd5688a8266e52dcd8047ed9b6a5ac17635e1e7732b691def249ff0ac409e0786854620f982a329ef888d21fc317b7780279e5aaaa2608e4a27ced4f7855b77227126c878694575ed805e0bf5e8229a0d60a8e7b4c39654180e36511e4614a9e42b8878fde98599873cfacbbed6d2e6174bed7fc3315f0da11e676"], 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0) 05:48:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.748010] erofs: read_super, device -> /dev/loop0 05:48:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.771386] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.799242] erofs: read_super, device -> /dev/loop2 [ 193.811613] erofs: read_super, device -> /dev/loop1 05:48:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.818262] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.825370] erofs: blksize 1 isn't supported on this platform [ 193.831457] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.846444] erofs: read_super, device -> /dev/loop3 [ 193.853084] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.861554] erofs: blksize 1 isn't supported on this platform 05:48:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.931999] erofs: read_super, device -> /dev/loop5 [ 193.937077] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 193.961373] erofs: cannot find valid erofs superblock 05:48:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 193.992370] erofs: read_super, device -> /dev/loop4 [ 193.997656] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.009561] erofs: cannot read erofs superblock [ 194.112219] erofs: read_super, device -> /dev/loop2 [ 194.117281] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.128517] erofs: read_super, device -> /dev/loop0 [ 194.129756] erofs: read_super, device -> /dev/loop3 [ 194.142958] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.153411] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.163757] erofs: read_super, device -> /dev/loop1 [ 194.168792] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.188391] erofs: blksize 1 isn't supported on this platform 05:48:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.334961] erofs: read_super, device -> /dev/loop4 [ 194.344446] erofs: read_super, device -> /dev/loop5 [ 194.352251] erofs: unmounted for /dev/loop1 [ 194.353180] erofs: read_super, device -> /dev/loop0 [ 194.362698] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.380921] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.386121] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.404975] erofs: cannot read erofs superblock [ 194.411366] erofs: cannot find valid erofs superblock 05:48:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.557892] erofs: read_super, device -> /dev/loop3 [ 194.559176] erofs: read_super, device -> /dev/loop0 [ 194.566559] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.571881] erofs: read_super, device -> /dev/loop2 [ 194.587016] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.593527] erofs: blksize 1 isn't supported on this platform [ 194.608219] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.619823] erofs: read_super, device -> /dev/loop1 [ 194.637162] erofs: read_super, device -> /dev/loop5 [ 194.645046] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.650327] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.671520] erofs: root inode @ nid 0 05:48:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.739181] erofs: unmounted for /dev/loop1 05:48:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.831850] erofs: read_super, device -> /dev/loop4 [ 194.836908] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.846624] erofs: read_super, device -> /dev/loop0 [ 194.857418] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.894021] erofs: cannot read erofs superblock [ 194.923748] erofs: read_super, device -> /dev/loop3 05:48:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 194.954004] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 194.973499] erofs: blksize 1 isn't supported on this platform 05:48:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.028383] erofs: read_super, device -> /dev/loop1 [ 195.040685] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.092679] erofs: read_super, device -> /dev/loop5 [ 195.099386] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.118462] erofs: root inode @ nid 0 [ 195.121869] erofs: read_super, device -> /dev/loop2 [ 195.127315] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.135319] erofs: read_super, device -> /dev/loop4 05:48:07 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.140882] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.166922] erofs: read_super, device -> /dev/loop0 [ 195.176754] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.186998] erofs: cannot find valid erofs superblock 05:48:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.195954] erofs: unmounted for /dev/loop1 [ 195.208691] erofs: cannot read erofs superblock 05:48:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.280888] erofs: read_super, device -> /dev/loop3 [ 195.286056] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.295944] erofs: blksize 1 isn't supported on this platform 05:48:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.442304] erofs: read_super, device -> /dev/loop5 [ 195.451238] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.465602] erofs: read_super, device -> /dev/loop0 [ 195.477236] erofs: root inode @ nid 0 [ 195.477253] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.496770] erofs: read_super, device -> /dev/loop2 [ 195.502057] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.511533] erofs: cannot find valid erofs superblock 05:48:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 195.642641] erofs: read_super, device -> /dev/loop4 [ 195.657655] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.682552] erofs: read_super, device -> /dev/loop3 [ 195.702138] erofs: cannot read erofs superblock [ 195.707870] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:08 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 195.745352] erofs: read_super, device -> /dev/loop0 [ 195.755171] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.832297] erofs: read_super, device -> /dev/loop2 [ 195.837542] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 195.849624] erofs: cannot find valid erofs superblock 05:48:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 196.087776] erofs: read_super, device -> /dev/loop4 [ 196.100634] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.135817] erofs: cannot read erofs superblock [ 196.146316] erofs: read_super, device -> /dev/loop0 [ 196.151460] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.160913] erofs: cannot find valid erofs superblock 05:48:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 196.383783] erofs: read_super, device -> /dev/loop2 [ 196.388986] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.401975] erofs: read_super, device -> /dev/loop3 [ 196.407029] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 196.431690] erofs: root inode @ nid 36 [ 196.437713] erofs: mounted on /dev/loop2 with opts: nouser_xattr. 05:48:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 196.582320] erofs: read_super, device -> /dev/loop4 [ 196.591816] erofs: read_super, device -> /dev/loop0 [ 196.595690] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.596858] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.610969] erofs: cannot find valid erofs superblock [ 196.618117] erofs: cannot find valid erofs superblock [ 196.642148] erofs: unmounted for /dev/loop2 [ 196.760761] erofs: read_super, device -> /dev/loop5 [ 196.778642] erofs: read_super, device -> /dev/loop3 05:48:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 196.803717] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 196.811056] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.891272] erofs: read_super, device -> /dev/loop2 05:48:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 196.916476] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 196.928336] erofs: root inode @ nid 36 [ 196.945669] erofs: mounted on /dev/loop2 with opts: nouser_xattr. [ 196.993235] erofs: read_super, device -> /dev/loop4 [ 197.022021] erofs: read_super, device -> /dev/loop0 [ 197.046023] erofs: read_super, device -> /dev/loop5 [ 197.050807] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.052544] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.070864] erofs: read_super, device -> /dev/loop3 [ 197.084099] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.119777] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 197.149453] erofs: unmounted for /dev/loop3 [ 197.155010] erofs: unmounted for /dev/loop2 05:48:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 197.169878] erofs: cannot find valid erofs superblock 05:48:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.190176] erofs: cannot find valid erofs superblock 05:48:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.300968] erofs: read_super, device -> /dev/loop3 [ 197.312057] erofs: read_super, device -> /dev/loop5 [ 197.317105] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 197.339910] erofs: read_super, device -> /dev/loop2 05:48:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.342132] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.366864] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.377266] erofs: root inode @ nid 36 [ 197.382228] erofs: mounted on /dev/loop2 with opts: nouser_xattr. [ 197.431783] erofs: read_super, device -> /dev/loop4 [ 197.436840] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.450095] erofs: read_super, device -> /dev/loop0 [ 197.466892] erofs: cannot find valid erofs superblock 05:48:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 197.499723] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.524810] erofs: root inode @ nid 36 [ 197.534381] erofs: read_super, device -> /dev/loop1 [ 197.539447] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.539555] erofs: unmounted for /dev/loop2 [ 197.557857] erofs: cannot read erofs superblock [ 197.583365] erofs: read_super, device -> /dev/loop3 [ 197.593529] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.759499] erofs: read_super, device -> /dev/loop5 [ 197.783158] erofs: options -> nouser_xattr,acl,noacl, 05:48:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 197.812539] erofs: read_super, device -> /dev/loop4 [ 197.816667] erofs: read_super, device -> /dev/loop1 [ 197.817882] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.827272] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 197.833428] erofs: cannot find valid erofs superblock [ 197.841499] erofs: cannot read erofs superblock 05:48:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.924786] erofs: read_super, device -> /dev/loop3 [ 197.929848] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 197.968366] erofs: read_super, device -> /dev/loop0 [ 197.973656] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.002050] erofs: root inode @ nid 36 05:48:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 198.066983] erofs: read_super, device -> /dev/loop1 [ 198.072379] erofs: read_super, device -> /dev/loop5 [ 198.088103] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.101183] erofs: options -> nouser_xattr,acl, [ 198.106576] erofs: cannot read erofs superblock 05:48:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 198.128850] erofs: read_super, device -> /dev/loop4 [ 198.134343] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.146709] erofs: cannot find valid erofs superblock 05:48:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 198.310202] erofs: read_super, device -> /dev/loop3 05:48:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 198.335578] erofs: read_super, device -> /dev/loop0 [ 198.340955] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.375569] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.384589] erofs: cannot find valid erofs superblock [ 198.392338] erofs: read_super, device -> /dev/loop1 [ 198.401275] erofs: read_super, device -> /dev/loop4 [ 198.405424] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.406854] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.418802] erofs: root inode @ nid 36 [ 198.428331] erofs: cannot find valid erofs superblock 05:48:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 198.428591] erofs: cannot read erofs superblock 05:48:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 198.543399] erofs: read_super, device -> /dev/loop5 [ 198.551746] erofs: options -> nouser_xattr,acl, 05:48:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 198.680115] erofs: read_super, device -> /dev/loop3 [ 198.685571] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.700398] erofs: read_super, device -> /dev/loop2 [ 198.720481] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, 05:48:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 198.721883] erofs: cannot find valid erofs superblock 05:48:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 198.780281] erofs: read_super, device -> /dev/loop4 [ 198.789340] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.803408] erofs: unmounted for /dev/loop2 [ 198.807907] erofs: cannot find valid erofs superblock [ 198.853817] erofs: read_super, device -> /dev/loop5 [ 198.858873] erofs: options -> nouser_xattr,acl, 05:48:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 198.963870] erofs: read_super, device -> /dev/loop1 [ 198.975316] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 198.988743] erofs: cannot read erofs superblock 05:48:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 199.113782] erofs: read_super, device -> /dev/loop2 [ 199.119084] erofs: read_super, device -> /dev/loop3 [ 199.131923] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.142031] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 199.154809] erofs: read_super, device -> /dev/loop5 05:48:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e803000000000000000000000100"/252, 0xfc, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 199.173048] erofs: read_super, device -> /dev/loop4 [ 199.180652] erofs: options -> nouser_xattr,noacl, [ 199.185716] erofs: cannot find valid erofs superblock [ 199.195113] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.218089] erofs: cannot find valid erofs superblock 05:48:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 199.226888] erofs: unmounted for /dev/loop2 05:48:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 199.375325] erofs: read_super, device -> /dev/loop1 [ 199.380387] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.392644] erofs: cannot read erofs superblock [ 199.409371] erofs: read_super, device -> /dev/loop5 [ 199.414883] erofs: options -> nouser_xattr,noacl, 05:48:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 199.541227] erofs: read_super, device -> /dev/loop3 [ 199.559083] erofs: read_super, device -> /dev/loop2 [ 199.561653] erofs: read_super, device -> /dev/loop4 [ 199.569147] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.584751] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 199.591254] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.623249] erofs: cannot find valid erofs superblock [ 199.636473] erofs: read_super, device -> /dev/loop1 05:48:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 199.642557] erofs: read_super, device -> /dev/loop0 [ 199.643014] erofs: root inode @ nid 36 [ 199.653448] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 199.663475] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.670547] erofs: mounted on /dev/loop3 with opts: nouser_xattr. [ 199.680174] erofs: unmounted for /dev/loop2 05:48:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 199.744392] erofs: unmounted for /dev/loop3 [ 199.852588] erofs: read_super, device -> /dev/loop5 05:48:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 199.879338] erofs: options -> nouser_xattr,noacl, [ 199.931802] erofs: read_super, device -> /dev/loop2 [ 199.936862] erofs: options -> nouser_xattr,acl,noacl, [ 199.952292] erofs: read_super, device -> /dev/loop4 [ 199.971568] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 199.992165] erofs: read_super, device -> /dev/loop3 05:48:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 200.027263] erofs: read_super, device -> /dev/loop0 [ 200.040225] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 200.041940] erofs: blksize 1 isn't supported on this platform [ 200.062767] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 200.098362] erofs: unmounted for /dev/loop2 [ 200.106787] erofs: read_super, device -> /dev/loop1 [ 200.115898] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.115959] erofs: root inode @ nid 36 [ 200.138005] erofs: mounted on /dev/loop3 with opts: nouser_xattr. 05:48:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.202410] erofs: read_super, device -> /dev/loop5 [ 200.219721] erofs: options -> acl,noacl, [ 200.238874] erofs: unmounted for /dev/loop3 05:48:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.319842] erofs: read_super, device -> /dev/loop2 [ 200.330595] erofs: options -> nouser_xattr,acl, [ 200.376463] erofs: read_super, device -> /dev/loop0 05:48:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.401427] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 200.420182] erofs: read_super, device -> /dev/loop4 [ 200.440462] erofs: unmounted for /dev/loop2 [ 200.457577] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.472478] erofs: cannot find valid erofs superblock 05:48:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.557336] erofs: read_super, device -> /dev/loop3 [ 200.563873] erofs: read_super, device -> /dev/loop5 [ 200.568917] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.572809] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 200.608104] erofs: read_super, device -> /dev/loop1 [ 200.610362] erofs: root inode @ nid 36 [ 200.620294] erofs: mounted on /dev/loop3 with opts: nouser_xattr. [ 200.628276] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 200.666836] erofs: root inode @ nid 36 [ 200.675875] erofs: read_super, device -> /dev/loop4 [ 200.683016] erofs: read_super, device -> /dev/loop2 [ 200.694186] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.707127] erofs: cannot find valid erofs superblock [ 200.712517] erofs: unmounted for /dev/loop3 05:48:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.716395] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 200.725851] erofs: options -> nouser_xattr,acl, [ 200.831842] erofs: read_super, device -> /dev/loop0 [ 200.836903] erofs: options -> nouser_xattr,acl,noacl, 05:48:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 200.901234] erofs: unmounted for /dev/loop2 05:48:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 200.959050] erofs: unmounted for /dev/loop5 [ 200.970774] erofs: read_super, device -> /dev/loop1 [ 200.975038] erofs: read_super, device -> /dev/loop4 [ 200.979611] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.981307] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 200.998094] erofs: cannot find valid erofs superblock 05:48:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 201.192722] erofs: read_super, device -> /dev/loop2 [ 201.197782] erofs: options -> nouser_xattr,acl, [ 201.204725] erofs: read_super, device -> /dev/loop5 [ 201.209772] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 201.213906] erofs: read_super, device -> /dev/loop0 05:48:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 201.272708] erofs: options -> nouser_xattr,acl, 05:48:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 201.323019] erofs: root inode @ nid 36 [ 201.338042] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 201.353490] erofs: unmounted for /dev/loop2 05:48:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 201.428654] erofs: unmounted for /dev/loop5 [ 201.447311] erofs: read_super, device -> /dev/loop1 [ 201.451713] erofs: read_super, device -> /dev/loop4 [ 201.452574] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 201.476273] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 201.490933] erofs: cannot find valid erofs superblock 05:48:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 201.678585] erofs: read_super, device -> /dev/loop2 [ 201.688013] erofs: read_super, device -> /dev/loop0 [ 201.697525] erofs: options -> nouser_xattr,acl, [ 201.706366] erofs: options -> nouser_xattr,noacl, 05:48:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 201.762731] erofs: read_super, device -> /dev/loop5 [ 201.768211] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 201.793053] erofs: root inode @ nid 36 [ 201.798007] erofs: mounted on /dev/loop5 with opts: nouser_xattr. 05:48:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:14 executing program 5: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 201.836391] erofs: read_super, device -> /dev/loop4 [ 201.842245] erofs: read_super, device -> /dev/loop1 [ 201.854101] erofs: unmounted for /dev/loop2 [ 201.862093] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 201.876677] erofs: unmounted for /dev/loop5 [ 201.877923] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 201.898278] erofs: cannot find valid erofs superblock [ 201.927375] erofs: read_super, device -> /dev/loop3 05:48:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 201.951055] erofs: read_super, device -> /dev/loop0 [ 201.962660] erofs: options -> nouser_xattr,acl, [ 201.967938] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, 05:48:14 executing program 5: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.059390] erofs: read_super, device -> /dev/loop2 05:48:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 202.086873] erofs: options -> nouser_xattr,noacl, [ 202.107499] erofs: unmounted for /dev/loop3 [ 202.154289] erofs: read_super, device -> /dev/loop1 [ 202.159354] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 202.176162] erofs: read_super, device -> /dev/loop4 05:48:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 202.198126] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 202.209277] erofs: cannot find valid erofs superblock [ 202.218381] erofs: unmounted for /dev/loop2 05:48:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.308553] erofs: read_super, device -> /dev/loop0 [ 202.314623] erofs: options -> nouser_xattr,noacl, 05:48:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:14 executing program 5: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.424123] erofs: read_super, device -> /dev/loop3 [ 202.440238] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 202.462346] erofs: read_super, device -> /dev/loop2 [ 202.474858] erofs: options -> nouser_xattr,noacl, 05:48:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 202.526019] erofs: read_super, device -> /dev/loop4 [ 202.531075] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 202.539562] erofs: read_super, device -> /dev/loop1 [ 202.544001] erofs: unmounted for /dev/loop3 [ 202.545240] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 202.558932] erofs: unmounted for /dev/loop2 [ 202.564644] erofs: cannot find valid erofs superblock 05:48:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.575781] erofs: read_super, device -> /dev/loop0 [ 202.580976] erofs: options -> nouser_xattr,noacl, 05:48:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.829408] erofs: read_super, device -> /dev/loop2 [ 202.835897] erofs: options -> acl,noacl, 05:48:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 202.896395] erofs: read_super, device -> /dev/loop3 [ 202.902864] erofs: unmounted for /dev/loop2 [ 202.907293] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 202.922308] erofs: read_super, device -> /dev/loop1 [ 202.927374] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 202.929837] erofs: read_super, device -> /dev/loop0 [ 202.941950] erofs: options -> nouser_xattr,noacl, 05:48:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) 05:48:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f00", 0x7e, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.012321] erofs: read_super, device -> /dev/loop4 [ 203.017511] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.026700] erofs: cannot find valid erofs superblock [ 203.034000] erofs: unmounted for /dev/loop3 05:48:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.151120] erofs: read_super, device -> /dev/loop2 [ 203.169059] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.266287] erofs: read_super, device -> /dev/loop1 [ 203.275740] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.276024] erofs: read_super, device -> /dev/loop3 [ 203.303540] erofs: read_super, device -> /dev/loop0 05:48:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.338507] erofs: options -> acl,noacl, [ 203.345311] erofs: unmounted for /dev/loop1 [ 203.346978] erofs: options -> nouser_xattr,acl,noacl, [ 203.426302] erofs: read_super, device -> /dev/loop4 [ 203.435030] erofs: read_super, device -> /dev/loop2 [ 203.443601] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 203.471336] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.489025] erofs: read_super, device -> /dev/loop1 [ 203.497923] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.501103] erofs: unmounted for /dev/loop2 05:48:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) 05:48:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.521242] erofs: cannot find valid erofs superblock [ 203.528306] erofs: unmounted for /dev/loop3 05:48:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.701246] erofs: read_super, device -> /dev/loop0 [ 203.710140] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.712362] erofs: read_super, device -> /dev/loop2 05:48:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.758306] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 203.815731] erofs: read_super, device -> /dev/loop3 [ 203.821037] erofs: read_super, device -> /dev/loop1 [ 203.823024] erofs: read_super, device -> /dev/loop4 [ 203.842603] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.844384] erofs: options -> nouser_xattr,acl,noacl, 05:48:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 203.864980] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 203.890479] erofs: cannot find valid erofs superblock [ 203.915456] erofs: unmounted for /dev/loop2 05:48:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 203.987458] erofs: unmounted for /dev/loop3 [ 204.016714] erofs: read_super, device -> /dev/loop5 [ 204.028204] erofs: read_super, device -> /dev/loop0 [ 204.034342] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.044214] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.053384] erofs: cannot find valid erofs superblock [ 204.058076] erofs: cannot read erofs superblock 05:48:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.084888] erofs: read_super, device -> /dev/loop2 [ 204.090467] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 204.152378] erofs: read_super, device -> /dev/loop1 [ 204.157454] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.198855] erofs: read_super, device -> /dev/loop3 [ 204.202941] erofs: read_super, device -> /dev/loop4 [ 204.219890] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.255652] erofs: options -> nouser_xattr,acl, 05:48:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e803000000000000000000000100"/63, 0x3f, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:16 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 204.310414] erofs: cannot find valid erofs superblock 05:48:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 204.336640] erofs: unmounted for /dev/loop2 05:48:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.368734] erofs: unmounted for /dev/loop3 05:48:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.391492] erofs: read_super, device -> /dev/loop5 [ 204.396558] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.405829] erofs: cannot read erofs superblock [ 204.415659] erofs: read_super, device -> /dev/loop0 [ 204.426604] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.476660] erofs: read_super, device -> /dev/loop1 [ 204.480782] erofs: read_super, device -> /dev/loop3 [ 204.488008] erofs: options -> nouser_xattr,acl, 05:48:16 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.533937] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.571585] erofs: unmounted for /dev/loop3 [ 204.576059] erofs: unmounted for /dev/loop0 [ 204.660524] erofs: read_super, device -> /dev/loop4 [ 204.666041] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.666444] erofs: read_super, device -> /dev/loop5 [ 204.678107] erofs: cannot find valid erofs superblock [ 204.690837] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.701215] erofs: cannot read erofs superblock 05:48:17 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.711816] erofs: read_super, device -> /dev/loop0 [ 204.716855] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 204.739679] erofs: unmounted for /dev/loop1 05:48:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 204.960757] erofs: read_super, device -> /dev/loop3 [ 204.979127] erofs: unmounted for /dev/loop0 [ 204.994236] erofs: options -> nouser_xattr,acl, 05:48:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 205.067938] erofs: read_super, device -> /dev/loop1 [ 205.075911] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 205.091885] erofs: read_super, device -> /dev/loop4 [ 205.096950] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 205.109387] erofs: blksize 1 isn't supported on this platform [ 205.115721] erofs: unmounted for /dev/loop3 [ 205.124434] erofs: read_super, device -> /dev/loop0 [ 205.132912] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:17 executing program 0: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 205.169380] erofs: read_super, device -> /dev/loop5 [ 205.188254] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 205.207183] erofs: cannot read erofs superblock [ 205.247941] erofs: unmounted for /dev/loop0 05:48:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 205.420149] erofs: read_super, device -> /dev/loop3 [ 205.436752] erofs: options -> nouser_xattr,noacl, 05:48:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 205.478378] erofs: read_super, device -> /dev/loop5 [ 205.486910] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 205.497703] erofs: unmounted for /dev/loop3 [ 205.501755] erofs: cannot read erofs superblock 05:48:17 executing program 0: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 205.572241] erofs: read_super, device -> /dev/loop1 [ 205.585805] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 205.785533] erofs: read_super, device -> /dev/loop3 [ 205.790990] erofs: options -> nouser_xattr,noacl, 05:48:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 205.866734] erofs: unmounted for /dev/loop3 05:48:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:18 executing program 0: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 206.072919] erofs: read_super, device -> /dev/loop1 [ 206.077977] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 206.148194] erofs: read_super, device -> /dev/loop5 [ 206.153702] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 206.162373] erofs: cannot read erofs superblock [ 206.174405] erofs: read_super, device -> /dev/loop3 [ 206.179483] erofs: options -> nouser_xattr,noacl, 05:48:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 206.370775] erofs: unmounted for /dev/loop3 [ 206.467835] erofs: read_super, device -> /dev/loop2 [ 206.467839] erofs: read_super, device -> /dev/loop4 [ 206.467851] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 206.475505] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 206.483923] erofs: blksize 1 isn't supported on this platform [ 206.492540] erofs: cannot read erofs superblock [ 206.512434] erofs: read_super, device -> /dev/loop1 [ 206.513248] erofs: read_super, device -> /dev/loop5 [ 206.519776] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 206.547078] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 206.557915] erofs: root inode @ nid 36 [ 206.655765] erofs: read_super, device -> /dev/loop3 05:48:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 206.696962] erofs: options -> acl,noacl, 05:48:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 206.717642] erofs: unmounted for /dev/loop1 [ 206.740257] erofs: unmounted for /dev/loop3 05:48:19 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 206.871180] erofs: read_super, device -> /dev/loop2 [ 206.876846] erofs: read_super, device -> /dev/loop5 [ 206.882261] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 206.891246] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 206.897965] erofs: read_super, device -> /dev/loop1 [ 206.897968] erofs: read_super, device -> /dev/loop4 [ 206.897980] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, 05:48:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 206.906434] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 206.919769] FAULT_INJECTION: forcing a failure. [ 206.919769] name failslab, interval 1, probability 0, space 0, times 1 [ 206.925266] erofs: root inode @ nid 36 [ 206.939735] erofs: cannot read erofs superblock [ 206.939763] erofs: blksize 1 isn't supported on this platform [ 206.955250] CPU: 1 PID: 14537 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 206.963148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.972500] Call Trace: [ 206.975080] dump_stack+0x1fc/0x2ef [ 206.978692] should_fail.cold+0xa/0xf [ 206.982486] ? setup_fault_attr+0x200/0x200 [ 206.986803] ? lock_acquire+0x170/0x3c0 [ 206.990837] __should_failslab+0x115/0x180 [ 206.995058] should_failslab+0x5/0x10 [ 206.998841] __kmalloc+0x2ab/0x3c0 [ 207.002362] ? __se_sys_memfd_create+0xf8/0x440 [ 207.007013] __se_sys_memfd_create+0xf8/0x440 [ 207.011497] ? memfd_file_seals_ptr+0x150/0x150 [ 207.016153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 207.021542] ? trace_hardirqs_off_caller+0x6e/0x210 [ 207.026565] ? do_syscall_64+0x21/0x620 [ 207.030530] do_syscall_64+0xf9/0x620 [ 207.034319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.039494] RIP: 0033:0x465b09 [ 207.042670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.061559] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:48:19 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 207.069250] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 207.076505] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 207.083755] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 207.091009] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 207.098264] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 207.282898] FAULT_INJECTION: forcing a failure. [ 207.282898] name failslab, interval 1, probability 0, space 0, times 0 [ 207.315792] erofs: read_super, device -> /dev/loop2 [ 207.320855] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 207.347883] erofs: read_super, device -> /dev/loop4 [ 207.367931] erofs: read_super, device -> /dev/loop1 [ 207.368215] erofs: cannot read erofs superblock [ 207.375045] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 207.388848] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 207.394716] CPU: 1 PID: 14552 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 207.398170] erofs: blksize 1 isn't supported on this platform [ 207.404893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.404900] Call Trace: [ 207.404927] dump_stack+0x1fc/0x2ef [ 207.404944] should_fail.cold+0xa/0xf [ 207.404961] ? setup_fault_attr+0x200/0x200 [ 207.404976] ? lock_acquire+0x170/0x3c0 [ 207.404996] __should_failslab+0x115/0x180 [ 207.415174] erofs: read_super, device -> /dev/loop5 [ 207.420222] should_failslab+0x5/0x10 [ 207.420239] kmem_cache_alloc+0x277/0x370 [ 207.420260] ? shmem_destroy_callback+0xb0/0xb0 [ 207.423587] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 207.426453] shmem_alloc_inode+0x18/0x40 [ 207.426470] ? shmem_destroy_callback+0xb0/0xb0 [ 207.426484] alloc_inode+0x5d/0x180 [ 207.426499] new_inode+0x1d/0xf0 [ 207.430622] erofs: root inode @ nid 36 [ 207.434607] shmem_get_inode+0x96/0x8d0 [ 207.434629] __shmem_file_setup.part.0+0x7a/0x2b0 [ 207.434649] shmem_file_setup+0x61/0x90 [ 207.434666] __se_sys_memfd_create+0x26b/0x440 [ 207.434679] ? memfd_file_seals_ptr+0x150/0x150 [ 207.434693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 207.434712] ? trace_hardirqs_off_caller+0x6e/0x210 [ 207.520462] ? do_syscall_64+0x21/0x620 [ 207.524435] do_syscall_64+0xf9/0x620 [ 207.528237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.533408] RIP: 0033:0x465b09 [ 207.536589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.555484] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 207.563185] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 207.570443] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 207.577700] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 207.584954] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 05:48:19 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 207.592209] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 207.711599] FAULT_INJECTION: forcing a failure. [ 207.711599] name failslab, interval 1, probability 0, space 0, times 0 [ 207.723095] CPU: 1 PID: 14578 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 207.730981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.740333] Call Trace: [ 207.742958] dump_stack+0x1fc/0x2ef [ 207.746653] should_fail.cold+0xa/0xf [ 207.750441] ? setup_fault_attr+0x200/0x200 [ 207.754750] ? lock_acquire+0x170/0x3c0 [ 207.758710] __should_failslab+0x115/0x180 [ 207.762932] should_failslab+0x5/0x10 [ 207.766765] kmem_cache_alloc+0x277/0x370 [ 207.770901] __d_alloc+0x2b/0xa10 [ 207.774342] d_alloc_pseudo+0x19/0x70 [ 207.778140] alloc_file_pseudo+0xc6/0x250 [ 207.782283] ? alloc_file+0x4d0/0x4d0 [ 207.786069] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 207.791684] ? shmem_get_inode+0x44c/0x8d0 [ 207.795909] __shmem_file_setup.part.0+0x102/0x2b0 [ 207.800824] shmem_file_setup+0x61/0x90 [ 207.804784] __se_sys_memfd_create+0x26b/0x440 [ 207.809349] ? memfd_file_seals_ptr+0x150/0x150 [ 207.814006] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 207.819356] ? trace_hardirqs_off_caller+0x6e/0x210 [ 207.824359] ? do_syscall_64+0x21/0x620 [ 207.828317] do_syscall_64+0xf9/0x620 [ 207.832160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.837359] RIP: 0033:0x465b09 [ 207.840554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.859492] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 207.867207] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 207.874642] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 207.881896] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 207.889149] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 207.896404] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) 05:48:20 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.002568] erofs: read_super, device -> /dev/loop1 05:48:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 208.028959] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 208.059023] FAULT_INJECTION: forcing a failure. [ 208.059023] name failslab, interval 1, probability 0, space 0, times 0 [ 208.086967] erofs: read_super, device -> /dev/loop4 [ 208.092612] erofs: options -> nouser_xattr,acl,noacl, [ 208.098177] erofs: blksize 1 isn't supported on this platform [ 208.124976] CPU: 0 PID: 14591 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 208.132893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.142250] Call Trace: [ 208.144834] dump_stack+0x1fc/0x2ef [ 208.148450] should_fail.cold+0xa/0xf [ 208.152241] ? setup_fault_attr+0x200/0x200 [ 208.156547] ? lock_acquire+0x170/0x3c0 [ 208.160532] __should_failslab+0x115/0x180 [ 208.164755] should_failslab+0x5/0x10 [ 208.168539] kmem_cache_alloc+0x277/0x370 [ 208.172673] __alloc_file+0x21/0x330 [ 208.176386] alloc_empty_file+0x6d/0x170 [ 208.180461] alloc_file+0x5e/0x4d0 [ 208.184003] alloc_file_pseudo+0x165/0x250 [ 208.188224] ? alloc_file+0x4d0/0x4d0 [ 208.192011] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 208.197621] ? shmem_get_inode+0x44c/0x8d0 [ 208.201842] __shmem_file_setup.part.0+0x102/0x2b0 [ 208.206758] shmem_file_setup+0x61/0x90 [ 208.210719] __se_sys_memfd_create+0x26b/0x440 [ 208.215285] ? memfd_file_seals_ptr+0x150/0x150 [ 208.219939] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 208.225286] ? trace_hardirqs_off_caller+0x6e/0x210 [ 208.230286] ? do_syscall_64+0x21/0x620 [ 208.234258] do_syscall_64+0xf9/0x620 [ 208.238066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.243245] RIP: 0033:0x465b09 [ 208.246429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.265330] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 208.273023] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 208.280282] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:48:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.287649] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 208.294911] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 208.302167] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:20 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ff", 0x11, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.352415] erofs: read_super, device -> /dev/loop2 [ 208.357473] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 208.366594] erofs: read_super, device -> /dev/loop5 [ 208.372222] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 208.380434] erofs: root inode @ nid 36 05:48:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.453029] erofs: cannot read erofs superblock [ 208.480564] FAULT_INJECTION: forcing a failure. [ 208.480564] name failslab, interval 1, probability 0, space 0, times 0 [ 208.494554] CPU: 1 PID: 14618 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 208.502456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.511806] Call Trace: [ 208.514392] dump_stack+0x1fc/0x2ef [ 208.518011] should_fail.cold+0xa/0xf [ 208.521804] ? setup_fault_attr+0x200/0x200 [ 208.526115] ? lock_acquire+0x170/0x3c0 [ 208.530080] __should_failslab+0x115/0x180 [ 208.534305] should_failslab+0x5/0x10 [ 208.538091] kmem_cache_alloc_trace+0x284/0x380 [ 208.542772] apparmor_file_alloc_security+0x394/0xad0 [ 208.547948] ? do_raw_spin_unlock+0x171/0x230 [ 208.552427] ? apparmor_file_receive+0x160/0x160 [ 208.557169] ? __alloc_file+0x21/0x330 [ 208.561046] security_file_alloc+0x40/0x90 [ 208.565272] __alloc_file+0xc9/0x330 [ 208.568976] alloc_empty_file+0x6d/0x170 [ 208.573025] alloc_file+0x5e/0x4d0 [ 208.576553] alloc_file_pseudo+0x165/0x250 [ 208.580865] ? alloc_file+0x4d0/0x4d0 [ 208.584651] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 208.590262] ? shmem_get_inode+0x44c/0x8d0 [ 208.594495] __shmem_file_setup.part.0+0x102/0x2b0 [ 208.599413] shmem_file_setup+0x61/0x90 [ 208.603375] __se_sys_memfd_create+0x26b/0x440 [ 208.607944] ? memfd_file_seals_ptr+0x150/0x150 [ 208.612599] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 208.617972] ? trace_hardirqs_off_caller+0x6e/0x210 [ 208.622976] ? do_syscall_64+0x21/0x620 [ 208.626939] do_syscall_64+0xf9/0x620 [ 208.630729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.635901] RIP: 0033:0x465b09 [ 208.639082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.657966] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 208.665658] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 208.672911] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:48:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.680164] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 208.687416] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 208.694674] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:21 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 208.724747] erofs: read_super, device -> /dev/loop1 [ 208.730009] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 208.741594] erofs: read_super, device -> /dev/loop4 [ 208.746644] erofs: options -> nouser_xattr,acl, [ 208.766332] erofs: blksize 1 isn't supported on this platform 05:48:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 208.796422] erofs: unmounted for /dev/loop1 [ 208.802770] erofs: read_super, device -> /dev/loop0 [ 208.808418] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 208.817109] erofs: cannot read erofs superblock [ 208.824873] FAULT_INJECTION: forcing a failure. [ 208.824873] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 208.837594] CPU: 1 PID: 14633 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 208.845491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.854834] Call Trace: [ 208.857416] dump_stack+0x1fc/0x2ef [ 208.861034] should_fail.cold+0xa/0xf [ 208.864857] ? lock_acquire+0x170/0x3c0 [ 208.868818] ? setup_fault_attr+0x200/0x200 [ 208.873128] __alloc_pages_nodemask+0x239/0x2890 [ 208.877870] ? __lock_acquire+0x6de/0x3ff0 [ 208.882092] ? static_obj+0x50/0x50 [ 208.885706] ? __lock_acquire+0x6de/0x3ff0 [ 208.889924] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 208.894765] ? __lock_acquire+0x6de/0x3ff0 [ 208.899061] ? deref_stack_reg+0x134/0x1d0 [ 208.903290] ? mark_held_locks+0xf0/0xf0 [ 208.907336] ? mark_held_locks+0xf0/0xf0 [ 208.911395] ? unwind_next_frame+0x10a9/0x1c60 [ 208.915971] alloc_pages_vma+0xf2/0x780 [ 208.919934] shmem_alloc_page+0x11c/0x1f0 [ 208.924066] ? shmem_swapin+0x220/0x220 [ 208.928051] ? percpu_counter_add_batch+0x126/0x180 [ 208.933061] ? __vm_enough_memory+0x316/0x650 [ 208.937543] shmem_alloc_and_acct_page+0x15a/0x850 [ 208.942475] shmem_getpage_gfp+0x4e9/0x37f0 [ 208.946799] ? shmem_alloc_and_acct_page+0x850/0x850 [ 208.951890] ? mark_held_locks+0xa6/0xf0 [ 208.955933] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 208.961108] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 208.966286] shmem_write_begin+0xff/0x1e0 [ 208.970422] generic_perform_write+0x1f8/0x4d0 [ 208.974997] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 208.979648] ? current_time+0x1c0/0x1c0 [ 208.983623] ? lock_acquire+0x170/0x3c0 [ 208.987601] __generic_file_write_iter+0x24b/0x610 [ 208.992520] generic_file_write_iter+0x3f8/0x730 [ 208.997273] __vfs_write+0x51b/0x770 [ 209.000972] ? kernel_read+0x110/0x110 [ 209.004860] ? check_preemption_disabled+0x41/0x280 [ 209.009874] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 209.015003] vfs_write+0x1f3/0x540 [ 209.018561] __x64_sys_pwrite64+0x1f7/0x250 [ 209.022885] ? ksys_pwrite64+0x1a0/0x1a0 [ 209.026944] ? trace_hardirqs_off_caller+0x6e/0x210 [ 209.031971] ? do_syscall_64+0x21/0x620 [ 209.035942] do_syscall_64+0xf9/0x620 [ 209.039738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.044922] RIP: 0033:0x4191a7 [ 209.048106] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 209.066991] RSP: 002b:00007f0db5b43f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 209.074680] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 209.081987] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 209.089247] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 209.096500] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 209.103757] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 209.162894] erofs: read_super, device -> /dev/loop5 [ 209.164237] erofs: read_super, device -> /dev/loop2 [ 209.178909] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 209.185615] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 209.187608] erofs: cannot read erofs superblock [ 209.197478] erofs: read_super, device -> /dev/loop3 [ 209.205677] erofs: read_super, device -> /dev/loop1 05:48:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:21 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}]}) 05:48:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 209.210878] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 209.230955] erofs: options -> acl,noacl, [ 209.236962] erofs: root inode @ nid 36 [ 209.240954] erofs: cannot find valid erofs superblock [ 209.377692] erofs: read_super, device -> /dev/loop0 [ 209.395620] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 209.406170] erofs: read_super, device -> /dev/loop4 [ 209.417027] erofs: options -> nouser_xattr, 05:48:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:21 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 209.426302] erofs: blksize 1 isn't supported on this platform [ 209.433572] erofs: cannot read erofs superblock [ 209.468450] erofs: read_super, device -> /dev/loop2 05:48:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 209.488864] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 209.512502] erofs: cannot read erofs superblock [ 209.516749] FAULT_INJECTION: forcing a failure. [ 209.516749] name failslab, interval 1, probability 0, space 0, times 0 [ 209.531798] CPU: 1 PID: 14673 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 209.539685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.549036] Call Trace: [ 209.551625] dump_stack+0x1fc/0x2ef [ 209.555243] should_fail.cold+0xa/0xf [ 209.559032] ? setup_fault_attr+0x200/0x200 [ 209.563345] ? lock_acquire+0x170/0x3c0 [ 209.567312] __should_failslab+0x115/0x180 [ 209.571540] should_failslab+0x5/0x10 [ 209.575326] kmem_cache_alloc+0x277/0x370 [ 209.579462] getname_flags+0xce/0x590 [ 209.583273] do_sys_open+0x26c/0x520 [ 209.586999] ? filp_open+0x70/0x70 [ 209.590532] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.595882] ? trace_hardirqs_off_caller+0x6e/0x210 [ 209.600884] ? do_syscall_64+0x21/0x620 [ 209.604846] do_syscall_64+0xf9/0x620 [ 209.608635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.613809] RIP: 0033:0x4190f4 [ 209.616991] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 05:48:21 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 209.635878] RSP: 002b:00007f0db5b43ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 209.643578] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 209.650834] RDX: 0000000000000002 RSI: 00007f0db5b44000 RDI: 00000000ffffff9c [ 209.658103] RBP: 00007f0db5b44000 R08: 0000000000000000 R09: ffffffffffffffff [ 209.665359] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 209.672612] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 209.731064] erofs: read_super, device -> /dev/loop1 [ 209.741597] erofs: read_super, device -> /dev/loop5 [ 209.758727] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 209.771331] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 209.786782] FAULT_INJECTION: forcing a failure. [ 209.786782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.798612] CPU: 0 PID: 14686 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 209.806498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.815861] Call Trace: [ 209.818469] dump_stack+0x1fc/0x2ef [ 209.822113] should_fail.cold+0xa/0xf [ 209.825932] ? setup_fault_attr+0x200/0x200 [ 209.827581] erofs: root inode @ nid 36 [ 209.830263] ? do_writepages+0x290/0x290 [ 209.830281] ? unlock_page+0x13d/0x230 [ 209.830299] __alloc_pages_nodemask+0x239/0x2890 [ 209.830318] ? lock_downgrade+0x720/0x720 [ 209.851069] ? check_preemption_disabled+0x41/0x280 [ 209.856078] ? __lock_acquire+0x6de/0x3ff0 [ 209.860311] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 209.865157] ? lock_downgrade+0x720/0x720 [ 209.869301] ? lock_acquire+0x170/0x3c0 [ 209.873266] ? up_write+0x18/0x150 [ 209.876792] ? generic_file_write_iter+0x381/0x730 [ 209.881720] ? iov_iter_init+0xb8/0x1d0 [ 209.885697] cache_grow_begin+0xa4/0x8a0 [ 209.889755] ? setup_fault_attr+0x200/0x200 [ 209.894171] ? lock_acquire+0x170/0x3c0 [ 209.898141] cache_alloc_refill+0x273/0x340 [ 209.902464] kmem_cache_alloc+0x346/0x370 [ 209.906611] getname_flags+0xce/0x590 [ 209.910397] do_sys_open+0x26c/0x520 [ 209.914106] ? filp_open+0x70/0x70 [ 209.917642] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.923013] ? trace_hardirqs_off_caller+0x6e/0x210 [ 209.928028] ? do_syscall_64+0x21/0x620 [ 209.931990] do_syscall_64+0xf9/0x620 [ 209.935790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.940972] RIP: 0033:0x4190f4 [ 209.944149] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 209.963047] RSP: 002b:00007f0db5b43ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 209.970757] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 209.978013] RDX: 0000000000000002 RSI: 00007f0db5b44000 RDI: 00000000ffffff9c [ 209.985276] RBP: 00007f0db5b44000 R08: 0000000000000000 R09: ffffffffffffffff [ 209.992538] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 209.999797] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:48:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 210.064407] erofs: read_super, device -> /dev/loop0 [ 210.069723] erofs: read_super, device -> /dev/loop4 [ 210.077864] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 210.083357] erofs: options -> [ 210.087267] erofs: cannot read erofs superblock [ 210.099107] erofs: read_super, device -> /dev/loop2 [ 210.106737] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 210.117523] erofs: blksize 1 isn't supported on this platform [ 210.135653] erofs: read_super, device -> /dev/loop3 [ 210.144238] erofs: options -> acl,noacl, 05:48:22 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 210.214633] erofs: read_super, device -> /dev/loop5 [ 210.221793] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 210.241397] erofs: root inode @ nid 36 [ 210.245741] erofs: read_super, device -> /dev/loop1 [ 210.250802] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:22 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 210.284050] erofs: unmounted for /dev/loop3 [ 210.305162] FAULT_INJECTION: forcing a failure. [ 210.305162] name failslab, interval 1, probability 0, space 0, times 0 [ 210.316719] CPU: 0 PID: 14720 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 210.324608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.333959] Call Trace: [ 210.336566] dump_stack+0x1fc/0x2ef [ 210.340207] should_fail.cold+0xa/0xf [ 210.344106] ? setup_fault_attr+0x200/0x200 [ 210.348441] ? lock_acquire+0x170/0x3c0 05:48:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400", 0xa, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 210.352433] __should_failslab+0x115/0x180 [ 210.356680] should_failslab+0x5/0x10 [ 210.360489] __kmalloc+0x2ab/0x3c0 [ 210.364031] ? __se_sys_memfd_create+0xf8/0x440 [ 210.368696] __se_sys_memfd_create+0xf8/0x440 [ 210.373191] ? memfd_file_seals_ptr+0x150/0x150 [ 210.377855] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.383227] ? trace_hardirqs_off_caller+0x6e/0x210 [ 210.388227] ? do_syscall_64+0x21/0x620 [ 210.392201] do_syscall_64+0xf9/0x620 [ 210.395997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.401173] RIP: 0033:0x465b09 [ 210.404362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 210.423326] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 210.431026] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 210.438359] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 210.445613] RBP: 0000000000000002 R08: 0000000000001000 R09: ffffffffffffffff 05:48:22 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 210.452873] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 210.460138] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 210.537600] erofs: read_super, device -> /dev/loop0 [ 210.543130] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 210.554612] erofs: cannot read erofs superblock [ 210.559588] erofs: read_super, device -> /dev/loop1 [ 210.572148] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 210.600736] FAULT_INJECTION: forcing a failure. [ 210.600736] name failslab, interval 1, probability 0, space 0, times 0 [ 210.613190] CPU: 0 PID: 14734 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 210.621110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.625972] FAULT_INJECTION: forcing a failure. [ 210.625972] name failslab, interval 1, probability 0, space 0, times 0 [ 210.630475] Call Trace: [ 210.630504] dump_stack+0x1fc/0x2ef [ 210.630524] should_fail.cold+0xa/0xf [ 210.630550] ? setup_fault_attr+0x200/0x200 [ 210.656011] ? lock_acquire+0x170/0x3c0 [ 210.659983] __should_failslab+0x115/0x180 [ 210.664223] should_failslab+0x5/0x10 [ 210.668027] kmem_cache_alloc+0x277/0x370 [ 210.672170] ? shmem_destroy_callback+0xb0/0xb0 [ 210.676838] shmem_alloc_inode+0x18/0x40 [ 210.680893] ? shmem_destroy_callback+0xb0/0xb0 [ 210.685560] alloc_inode+0x5d/0x180 [ 210.689179] new_inode+0x1d/0xf0 [ 210.692537] shmem_get_inode+0x96/0x8d0 [ 210.696507] __shmem_file_setup.part.0+0x7a/0x2b0 [ 210.701354] shmem_file_setup+0x61/0x90 [ 210.705333] __se_sys_memfd_create+0x26b/0x440 [ 210.709922] ? memfd_file_seals_ptr+0x150/0x150 [ 210.714594] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.719953] ? trace_hardirqs_off_caller+0x6e/0x210 [ 210.724969] ? do_syscall_64+0x21/0x620 [ 210.728950] do_syscall_64+0xf9/0x620 [ 210.732752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.737929] RIP: 0033:0x465b09 [ 210.741122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 210.760019] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 210.767721] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 210.775016] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 210.782291] RBP: 0000000000000002 R08: 0000000000001000 R09: ffffffffffffffff [ 210.789555] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 210.796813] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 210.807157] CPU: 1 PID: 14737 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 210.815071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.824440] Call Trace: [ 210.827033] dump_stack+0x1fc/0x2ef [ 210.830649] should_fail.cold+0xa/0xf [ 210.834442] ? setup_fault_attr+0x200/0x200 [ 210.838757] ? lock_acquire+0x170/0x3c0 [ 210.842728] __should_failslab+0x115/0x180 [ 210.846955] should_failslab+0x5/0x10 [ 210.850749] kmem_cache_alloc+0x277/0x370 [ 210.854889] __alloc_file+0x21/0x330 [ 210.858590] alloc_empty_file+0x6d/0x170 [ 210.862638] path_openat+0xe9/0x2df0 [ 210.866341] ? __lock_acquire+0x6de/0x3ff0 [ 210.870565] ? path_lookupat+0x8d0/0x8d0 [ 210.874614] ? mark_held_locks+0xf0/0xf0 [ 210.878665] do_filp_open+0x18c/0x3f0 [ 210.882460] ? may_open_dev+0xf0/0xf0 [ 210.886249] ? __alloc_fd+0x28d/0x570 [ 210.890035] ? lock_downgrade+0x720/0x720 [ 210.894168] ? lock_acquire+0x170/0x3c0 [ 210.898126] ? __alloc_fd+0x34/0x570 [ 210.901828] ? do_raw_spin_unlock+0x171/0x230 [ 210.906309] ? _raw_spin_unlock+0x29/0x40 [ 210.910448] ? __alloc_fd+0x28d/0x570 [ 210.914238] do_sys_open+0x3b3/0x520 [ 210.917937] ? filp_open+0x70/0x70 [ 210.921465] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.926816] ? trace_hardirqs_off_caller+0x6e/0x210 [ 210.931818] ? do_syscall_64+0x21/0x620 [ 210.935781] do_syscall_64+0xf9/0x620 [ 210.939569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.944742] RIP: 0033:0x4190f4 [ 210.947922] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 210.966809] RSP: 002b:00007f0db5b43ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 210.974506] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 210.981758] RDX: 0000000000000002 RSI: 00007f0db5b44000 RDI: 00000000ffffff9c [ 210.989009] RBP: 00007f0db5b44000 R08: 0000000000000000 R09: ffffffffffffffff [ 210.996262] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 211.003515] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:48:23 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:23 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 211.096082] erofs: read_super, device -> /dev/loop2 [ 211.113606] FAULT_INJECTION: forcing a failure. [ 211.113606] name failslab, interval 1, probability 0, space 0, times 0 [ 211.127221] CPU: 1 PID: 14742 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 211.127986] erofs: unmounted for /dev/loop1 05:48:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 211.135134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.135141] Call Trace: [ 211.135167] dump_stack+0x1fc/0x2ef [ 211.135185] should_fail.cold+0xa/0xf [ 211.135203] ? setup_fault_attr+0x200/0x200 [ 211.135218] ? lock_acquire+0x170/0x3c0 [ 211.135241] __should_failslab+0x115/0x180 [ 211.135259] should_failslab+0x5/0x10 [ 211.142076] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 211.148930] kmem_cache_alloc_trace+0x284/0x380 [ 211.148953] apparmor_file_alloc_security+0x394/0xad0 [ 211.148968] ? apparmor_file_receive+0x160/0x160 [ 211.148985] ? __alloc_file+0x21/0x330 [ 211.149005] security_file_alloc+0x40/0x90 [ 211.149019] __alloc_file+0xc9/0x330 [ 211.149034] alloc_empty_file+0x6d/0x170 [ 211.149053] path_openat+0xe9/0x2df0 [ 211.149069] ? __lock_acquire+0x6de/0x3ff0 [ 211.149090] ? path_lookupat+0x8d0/0x8d0 [ 211.149108] ? mark_held_locks+0xf0/0xf0 [ 211.149127] do_filp_open+0x18c/0x3f0 [ 211.231792] ? may_open_dev+0xf0/0xf0 [ 211.235618] ? __alloc_fd+0x28d/0x570 [ 211.239412] ? lock_downgrade+0x720/0x720 [ 211.243544] ? lock_acquire+0x170/0x3c0 [ 211.247504] ? __alloc_fd+0x34/0x570 [ 211.251207] ? do_raw_spin_unlock+0x171/0x230 [ 211.255692] ? _raw_spin_unlock+0x29/0x40 [ 211.259823] ? __alloc_fd+0x28d/0x570 [ 211.263612] do_sys_open+0x3b3/0x520 [ 211.267315] ? filp_open+0x70/0x70 [ 211.270844] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.276193] ? trace_hardirqs_off_caller+0x6e/0x210 [ 211.281195] ? do_syscall_64+0x21/0x620 [ 211.285158] do_syscall_64+0xf9/0x620 [ 211.288945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.294117] RIP: 0033:0x4190f4 [ 211.297299] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 211.316182] RSP: 002b:00007f0db5b43ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 211.323891] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 211.331143] RDX: 0000000000000002 RSI: 00007f0db5b44000 RDI: 00000000ffffff9c [ 211.338397] RBP: 00007f0db5b44000 R08: 0000000000000000 R09: ffffffffffffffff [ 211.345649] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 211.352901] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 211.394456] erofs: read_super, device -> /dev/loop5 [ 211.395720] erofs: read_super, device -> /dev/loop0 [ 211.403921] FAULT_INJECTION: forcing a failure. [ 211.403921] name failslab, interval 1, probability 0, space 0, times 0 [ 211.418422] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 211.421735] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 211.427366] erofs: root inode @ nid 36 [ 211.446745] erofs: cannot read erofs superblock [ 211.453462] CPU: 1 PID: 14753 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 211.461368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.470722] Call Trace: [ 211.473390] dump_stack+0x1fc/0x2ef [ 211.477107] should_fail.cold+0xa/0xf [ 211.480896] ? setup_fault_attr+0x200/0x200 [ 211.485207] ? lock_acquire+0x170/0x3c0 [ 211.489175] __should_failslab+0x115/0x180 [ 211.493395] should_failslab+0x5/0x10 [ 211.497180] kmem_cache_alloc+0x277/0x370 [ 211.501324] __d_alloc+0x2b/0xa10 [ 211.504781] d_alloc_pseudo+0x19/0x70 [ 211.508567] alloc_file_pseudo+0xc6/0x250 [ 211.512700] ? alloc_file+0x4d0/0x4d0 [ 211.516484] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 211.522102] ? shmem_get_inode+0x44c/0x8d0 [ 211.526363] __shmem_file_setup.part.0+0x102/0x2b0 [ 211.531282] shmem_file_setup+0x61/0x90 [ 211.535246] __se_sys_memfd_create+0x26b/0x440 [ 211.539812] ? memfd_file_seals_ptr+0x150/0x150 [ 211.544482] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.549840] ? trace_hardirqs_off_caller+0x6e/0x210 [ 211.554849] ? do_syscall_64+0x21/0x620 [ 211.558822] do_syscall_64+0xf9/0x620 [ 211.562611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.567790] RIP: 0033:0x465b09 [ 211.570974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 211.589967] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:48:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:23 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:23 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 211.597659] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 211.604912] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 211.612164] RBP: 0000000000000002 R08: 0000000000001000 R09: ffffffffffffffff [ 211.619416] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 211.626677] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 211.818937] FAULT_INJECTION: forcing a failure. [ 211.818937] name failslab, interval 1, probability 0, space 0, times 0 [ 211.837566] FAULT_INJECTION: forcing a failure. [ 211.837566] name failslab, interval 1, probability 0, space 0, times 0 [ 211.854872] CPU: 0 PID: 14766 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 211.862788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.872158] Call Trace: [ 211.874777] dump_stack+0x1fc/0x2ef [ 211.878438] should_fail.cold+0xa/0xf [ 211.882256] ? setup_fault_attr+0x200/0x200 [ 211.886586] ? lock_acquire+0x170/0x3c0 [ 211.890562] __should_failslab+0x115/0x180 [ 211.894805] should_failslab+0x5/0x10 [ 211.898608] kmem_cache_alloc_trace+0x284/0x380 [ 211.903361] ? loop_info64_to_compat+0x5e0/0x5e0 [ 211.908109] __kthread_create_on_node+0xd2/0x410 [ 211.912863] ? kthread_parkme+0xa0/0xa0 [ 211.916837] ? lo_ioctl+0x1bb/0x20e0 [ 211.920548] ? __mutex_lock+0x3a8/0x1260 [ 211.924605] ? lock_downgrade+0x720/0x720 [ 211.928745] ? loop_info64_to_compat+0x5e0/0x5e0 [ 211.933503] kthread_create_on_node+0xbb/0xf0 [ 211.938000] ? __kthread_create_on_node+0x410/0x410 [ 211.943007] ? __fget+0x356/0x510 [ 211.946452] ? do_dup2+0x450/0x450 [ 211.949983] ? __lockdep_init_map+0x100/0x5a0 [ 211.954480] ? __lockdep_init_map+0x100/0x5a0 [ 211.958982] lo_ioctl+0xae5/0x20e0 [ 211.962527] ? loop_set_status64+0x110/0x110 [ 211.966932] blkdev_ioctl+0x5cb/0x1a80 [ 211.970817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.976174] ? blkpg_ioctl+0x9d0/0x9d0 [ 211.980061] ? mark_held_locks+0xf0/0xf0 [ 211.984121] ? mark_held_locks+0xf0/0xf0 [ 211.988177] ? debug_check_no_obj_freed+0x201/0x490 [ 211.993198] ? lock_downgrade+0x720/0x720 [ 211.997344] block_ioctl+0xe9/0x130 [ 212.000960] ? blkdev_fallocate+0x3f0/0x3f0 [ 212.005271] do_vfs_ioctl+0xcdb/0x12e0 [ 212.009148] ? lock_downgrade+0x720/0x720 [ 212.013295] ? check_preemption_disabled+0x41/0x280 [ 212.018311] ? ioctl_preallocate+0x200/0x200 [ 212.022720] ? __fget+0x356/0x510 [ 212.026182] ? do_dup2+0x450/0x450 [ 212.029727] ? do_sys_open+0x2bf/0x520 [ 212.033625] ksys_ioctl+0x9b/0xc0 [ 212.037080] __x64_sys_ioctl+0x6f/0xb0 [ 212.040966] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 212.045549] do_syscall_64+0xf9/0x620 [ 212.049349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.054533] RIP: 0033:0x4658c7 [ 212.057721] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.076614] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 212.084311] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 212.091569] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 212.098837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 212.106099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 212.113363] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 212.120646] CPU: 1 PID: 14769 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 212.128540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.137898] Call Trace: [ 212.140498] dump_stack+0x1fc/0x2ef [ 212.144136] should_fail.cold+0xa/0xf [ 212.147949] ? setup_fault_attr+0x200/0x200 [ 212.152282] ? lock_acquire+0x170/0x3c0 [ 212.156272] __should_failslab+0x115/0x180 [ 212.160517] should_failslab+0x5/0x10 [ 212.164335] kmem_cache_alloc+0x277/0x370 [ 212.168499] __alloc_file+0x21/0x330 [ 212.172227] alloc_empty_file+0x6d/0x170 [ 212.176300] alloc_file+0x5e/0x4d0 [ 212.179863] alloc_file_pseudo+0x165/0x250 [ 212.184116] ? alloc_file+0x4d0/0x4d0 [ 212.186102] erofs: read_super, device -> /dev/loop1 [ 212.187928] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 212.187945] ? shmem_get_inode+0x44c/0x8d0 [ 212.187964] __shmem_file_setup.part.0+0x102/0x2b0 [ 212.207745] shmem_file_setup+0x61/0x90 [ 212.211738] __se_sys_memfd_create+0x26b/0x440 05:48:24 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 212.214070] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 212.216340] ? memfd_file_seals_ptr+0x150/0x150 [ 212.216358] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 212.216373] ? trace_hardirqs_off_caller+0x6e/0x210 [ 212.216391] ? do_syscall_64+0x21/0x620 [ 212.243513] do_syscall_64+0xf9/0x620 [ 212.247337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.249814] erofs: read_super, device -> /dev/loop2 [ 212.252529] RIP: 0033:0x465b09 [ 212.252545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.252552] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 212.286388] erofs: read_super, device -> /dev/loop0 [ 212.287348] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 212.287358] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 212.287368] RBP: 0000000000000002 R08: 0000000000001000 R09: ffffffffffffffff [ 212.287376] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 212.287384] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 212.309219] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 212.315400] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:24 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 212.376300] erofs: cannot read erofs superblock 05:48:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 212.421046] FAULT_INJECTION: forcing a failure. [ 212.421046] name failslab, interval 1, probability 0, space 0, times 0 [ 212.433157] CPU: 0 PID: 14782 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 212.441053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.450412] Call Trace: [ 212.452994] dump_stack+0x1fc/0x2ef [ 212.456612] should_fail.cold+0xa/0xf [ 212.460400] ? setup_fault_attr+0x200/0x200 [ 212.464704] ? lock_acquire+0x170/0x3c0 [ 212.468681] __should_failslab+0x115/0x180 [ 212.472907] should_failslab+0x5/0x10 [ 212.476689] kmem_cache_alloc+0x277/0x370 [ 212.480825] __kernfs_new_node+0xd2/0x680 [ 212.484977] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 212.489737] ? __cpu_to_node+0x7b/0xa0 [ 212.493753] ? account_entity_enqueue+0x2e5/0x440 [ 212.498592] ? mark_held_locks+0xf0/0xf0 [ 212.502653] ? enqueue_entity+0xf86/0x3850 [ 212.506887] ? set_user_nice.part.0+0x3b9/0xab0 [ 212.511551] kernfs_create_dir_ns+0x9e/0x230 [ 212.515970] internal_create_group+0x1c1/0xb20 [ 212.520600] ? sysfs_remove_link_from_group+0x70/0x70 [ 212.525787] ? lock_downgrade+0x720/0x720 [ 212.529936] lo_ioctl+0xf7c/0x20e0 [ 212.533475] ? loop_set_status64+0x110/0x110 [ 212.537890] blkdev_ioctl+0x5cb/0x1a80 [ 212.541765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.547120] ? blkpg_ioctl+0x9d0/0x9d0 [ 212.550997] ? mark_held_locks+0xf0/0xf0 [ 212.555053] ? mark_held_locks+0xf0/0xf0 [ 212.560767] ? debug_check_no_obj_freed+0x201/0x490 [ 212.565777] ? lock_downgrade+0x720/0x720 [ 212.569915] block_ioctl+0xe9/0x130 [ 212.573522] ? blkdev_fallocate+0x3f0/0x3f0 [ 212.577828] do_vfs_ioctl+0xcdb/0x12e0 [ 212.581699] ? lock_downgrade+0x720/0x720 [ 212.585838] ? check_preemption_disabled+0x41/0x280 [ 212.590840] ? ioctl_preallocate+0x200/0x200 [ 212.595238] ? __fget+0x356/0x510 [ 212.598674] ? do_dup2+0x450/0x450 [ 212.602196] ? do_sys_open+0x2bf/0x520 [ 212.606071] ksys_ioctl+0x9b/0xc0 [ 212.609514] __x64_sys_ioctl+0x6f/0xb0 [ 212.613384] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 212.617950] do_syscall_64+0xf9/0x620 [ 212.621735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.626916] RIP: 0033:0x4658c7 [ 212.630101] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.648983] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 212.656678] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 212.663936] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 212.671199] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 212.678475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 212.685727] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 212.711141] erofs: read_super, device -> /dev/loop5 05:48:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 212.725859] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 212.742093] erofs: read_super, device -> /dev/loop3 [ 212.764878] erofs: options -> acl,noacl, [ 212.771633] erofs: root inode @ nid 36 05:48:25 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 212.795382] FAULT_INJECTION: forcing a failure. [ 212.795382] name failslab, interval 1, probability 0, space 0, times 0 [ 212.807393] erofs: unmounted for /dev/loop3 [ 212.821522] CPU: 1 PID: 14794 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 212.829447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.838794] Call Trace: [ 212.841383] dump_stack+0x1fc/0x2ef [ 212.845003] should_fail.cold+0xa/0xf [ 212.848816] ? setup_fault_attr+0x200/0x200 [ 212.853131] ? lock_acquire+0x170/0x3c0 [ 212.857102] __should_failslab+0x115/0x180 [ 212.861332] should_failslab+0x5/0x10 [ 212.865120] kmem_cache_alloc_trace+0x284/0x380 [ 212.869779] apparmor_file_alloc_security+0x394/0xad0 [ 212.874956] ? apparmor_file_receive+0x160/0x160 [ 212.879699] ? __alloc_file+0x21/0x330 [ 212.883576] security_file_alloc+0x40/0x90 [ 212.887798] __alloc_file+0xc9/0x330 [ 212.891500] alloc_empty_file+0x6d/0x170 [ 212.895552] alloc_file+0x5e/0x4d0 [ 212.899081] alloc_file_pseudo+0x165/0x250 [ 212.903304] ? alloc_file+0x4d0/0x4d0 [ 212.907091] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 212.912701] ? shmem_get_inode+0x44c/0x8d0 [ 212.916932] __shmem_file_setup.part.0+0x102/0x2b0 [ 212.921849] shmem_file_setup+0x61/0x90 [ 212.925809] __se_sys_memfd_create+0x26b/0x440 [ 212.930376] ? memfd_file_seals_ptr+0x150/0x150 [ 212.935032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 212.940382] ? trace_hardirqs_off_caller+0x6e/0x210 [ 212.945386] ? do_syscall_64+0x21/0x620 [ 212.949347] do_syscall_64+0xf9/0x620 [ 212.953135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.958308] RIP: 0033:0x465b09 [ 212.961488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.980372] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 212.988065] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 05:48:25 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 212.995324] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 213.002585] RBP: 0000000000000002 R08: 0000000000001000 R09: ffffffffffffffff [ 213.009972] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 213.017233] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 213.079704] erofs: read_super, device -> /dev/loop1 [ 213.085197] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 213.109245] erofs: read_super, device -> /dev/loop2 [ 213.127187] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 213.151436] FAULT_INJECTION: forcing a failure. [ 213.151436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.164414] CPU: 1 PID: 14807 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 213.172303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.181646] Call Trace: [ 213.184227] dump_stack+0x1fc/0x2ef [ 213.187925] should_fail.cold+0xa/0xf [ 213.191713] ? lock_acquire+0x170/0x3c0 [ 213.195729] ? setup_fault_attr+0x200/0x200 [ 213.200056] __alloc_pages_nodemask+0x239/0x2890 [ 213.204811] ? __lock_acquire+0x6de/0x3ff0 [ 213.209032] ? static_obj+0x50/0x50 [ 213.212647] ? __lock_acquire+0x6de/0x3ff0 [ 213.216867] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 213.221692] ? __lock_acquire+0x6de/0x3ff0 [ 213.225980] ? deref_stack_reg+0x134/0x1d0 [ 213.230199] ? mark_held_locks+0xf0/0xf0 [ 213.234246] ? mark_held_locks+0xf0/0xf0 [ 213.238294] ? unwind_next_frame+0x10a9/0x1c60 [ 213.242861] alloc_pages_vma+0xf2/0x780 [ 213.246840] shmem_alloc_page+0x11c/0x1f0 [ 213.250982] ? shmem_swapin+0x220/0x220 [ 213.254970] ? percpu_counter_add_batch+0x126/0x180 [ 213.259983] ? __vm_enough_memory+0x316/0x650 [ 213.264472] shmem_alloc_and_acct_page+0x15a/0x850 [ 213.269394] shmem_getpage_gfp+0x4e9/0x37f0 [ 213.273709] ? shmem_alloc_and_acct_page+0x850/0x850 [ 213.278798] ? mark_held_locks+0xa6/0xf0 [ 213.282841] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 213.288029] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 213.293226] shmem_write_begin+0xff/0x1e0 [ 213.297372] generic_perform_write+0x1f8/0x4d0 [ 213.301945] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 213.306601] ? current_time+0x1c0/0x1c0 [ 213.310563] ? lock_acquire+0x170/0x3c0 [ 213.314522] __generic_file_write_iter+0x24b/0x610 [ 213.319436] generic_file_write_iter+0x3f8/0x730 [ 213.324299] __vfs_write+0x51b/0x770 [ 213.328051] ? kernel_read+0x110/0x110 [ 213.331946] ? check_preemption_disabled+0x41/0x280 [ 213.336960] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 213.341965] vfs_write+0x1f3/0x540 [ 213.345493] __x64_sys_pwrite64+0x1f7/0x250 [ 213.349800] ? ksys_pwrite64+0x1a0/0x1a0 [ 213.353848] ? trace_hardirqs_off_caller+0x6e/0x210 [ 213.358847] ? do_syscall_64+0x21/0x620 [ 213.362815] do_syscall_64+0xf9/0x620 [ 213.366611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.371793] RIP: 0033:0x4191a7 [ 213.374985] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 213.393888] RSP: 002b:00007ff81a69df20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 213.401608] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 213.408876] RDX: 0000000000000004 RSI: 0000000020010000 RDI: 0000000000000004 [ 213.416130] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 213.423487] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 213.430742] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 213.460598] FAULT_INJECTION: forcing a failure. [ 213.460598] name failslab, interval 1, probability 0, space 0, times 0 [ 213.472180] CPU: 1 PID: 14810 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 213.480074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.489439] Call Trace: [ 213.492040] dump_stack+0x1fc/0x2ef [ 213.495665] should_fail.cold+0xa/0xf [ 213.499468] ? setup_fault_attr+0x200/0x200 [ 213.503780] ? lock_acquire+0x170/0x3c0 [ 213.507756] __should_failslab+0x115/0x180 [ 213.512008] should_failslab+0x5/0x10 [ 213.515804] kmem_cache_alloc+0x277/0x370 [ 213.519942] __kernfs_new_node+0xd2/0x680 [ 213.524093] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 213.528853] ? __mutex_unlock_slowpath+0xea/0x610 [ 213.533681] ? wait_for_completion_io+0x10/0x10 [ 213.538344] ? kernfs_next_descendant_post+0x19c/0x290 [ 213.543609] kernfs_new_node+0x92/0x120 [ 213.547584] __kernfs_create_file+0x51/0x340 [ 213.551996] sysfs_add_file_mode_ns+0x226/0x540 [ 213.556694] internal_create_group+0x355/0xb20 [ 213.561286] ? sysfs_remove_link_from_group+0x70/0x70 [ 213.566473] ? lock_downgrade+0x720/0x720 [ 213.570634] lo_ioctl+0xf7c/0x20e0 [ 213.574187] ? loop_set_status64+0x110/0x110 [ 213.578596] blkdev_ioctl+0x5cb/0x1a80 [ 213.582478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.587827] ? blkpg_ioctl+0x9d0/0x9d0 [ 213.591703] ? mark_held_locks+0xf0/0xf0 [ 213.595747] ? mark_held_locks+0xf0/0xf0 [ 213.599812] ? debug_check_no_obj_freed+0x201/0x490 [ 213.604824] ? lock_downgrade+0x720/0x720 [ 213.608956] block_ioctl+0xe9/0x130 [ 213.612567] ? blkdev_fallocate+0x3f0/0x3f0 [ 213.616891] do_vfs_ioctl+0xcdb/0x12e0 [ 213.620799] ? lock_downgrade+0x720/0x720 [ 213.624942] ? check_preemption_disabled+0x41/0x280 [ 213.629943] ? ioctl_preallocate+0x200/0x200 [ 213.634339] ? __fget+0x356/0x510 [ 213.637778] ? do_dup2+0x450/0x450 [ 213.641301] ? do_sys_open+0x2bf/0x520 [ 213.645191] ksys_ioctl+0x9b/0xc0 [ 213.648652] __x64_sys_ioctl+0x6f/0xb0 [ 213.652545] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 213.657132] do_syscall_64+0xf9/0x620 [ 213.660929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.666104] RIP: 0033:0x4658c7 [ 213.669287] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 213.688171] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.695860] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 213.703121] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 213.710383] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 213.717646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 213.724910] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 213.777376] erofs: read_super, device -> /dev/loop3 [ 213.782433] erofs: options -> acl,noacl, [ 213.794321] erofs: read_super, device -> /dev/loop0 [ 213.799637] erofs: read_super, device -> /dev/loop4 [ 213.804662] erofs: options -> [ 213.812484] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 213.824177] erofs: cannot find valid erofs superblock 05:48:26 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:26 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 213.862847] erofs: read_super, device -> /dev/loop5 [ 213.868247] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 213.884480] erofs: root inode @ nid 36 [ 213.900727] erofs: unmounted for /dev/loop3 05:48:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 213.994417] erofs: read_super, device -> /dev/loop2 [ 214.001833] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 214.026140] FAULT_INJECTION: forcing a failure. [ 214.026140] name failslab, interval 1, probability 0, space 0, times 0 [ 214.039540] CPU: 0 PID: 14840 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 214.047436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.056792] Call Trace: [ 214.059391] dump_stack+0x1fc/0x2ef [ 214.063039] should_fail.cold+0xa/0xf [ 214.066851] ? setup_fault_attr+0x200/0x200 [ 214.067666] erofs: read_super, device -> /dev/loop1 [ 214.071182] ? lock_acquire+0x170/0x3c0 [ 214.076179] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 214.080142] __should_failslab+0x115/0x180 [ 214.080159] should_failslab+0x5/0x10 [ 214.080171] kmem_cache_alloc+0x277/0x370 [ 214.080188] getname_flags+0xce/0x590 [ 214.080205] do_sys_open+0x26c/0x520 [ 214.080218] ? filp_open+0x70/0x70 [ 214.080235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 214.080251] ? trace_hardirqs_off_caller+0x6e/0x210 [ 214.080265] ? do_syscall_64+0x21/0x620 [ 214.080282] do_syscall_64+0xf9/0x620 [ 214.129252] FAULT_INJECTION: forcing a failure. [ 214.129252] name failslab, interval 1, probability 0, space 0, times 0 [ 214.129688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.146038] RIP: 0033:0x4190f4 [ 214.149239] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 214.168150] RSP: 002b:00007ff81a69ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 214.175857] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 214.183117] RDX: 0000000000000002 RSI: 00007ff81a69e000 RDI: 00000000ffffff9c 05:48:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 214.190383] RBP: 00007ff81a69e000 R08: 0000000000000000 R09: ffffffffffffffff [ 214.197643] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 214.204902] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 214.212182] CPU: 1 PID: 14839 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 214.220068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.229415] Call Trace: [ 214.231990] dump_stack+0x1fc/0x2ef [ 214.235683] should_fail.cold+0xa/0xf [ 214.239485] ? setup_fault_attr+0x200/0x200 [ 214.243790] ? lock_acquire+0x170/0x3c0 [ 214.247764] __should_failslab+0x115/0x180 [ 214.251988] should_failslab+0x5/0x10 [ 214.255774] kmem_cache_alloc+0x277/0x370 [ 214.259920] __kernfs_new_node+0xd2/0x680 [ 214.264064] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 214.268825] ? __mutex_unlock_slowpath+0xea/0x610 [ 214.273662] ? wait_for_completion_io+0x10/0x10 [ 214.278565] ? kernfs_next_descendant_post+0x19c/0x290 [ 214.283840] kernfs_new_node+0x92/0x120 [ 214.287817] __kernfs_create_file+0x51/0x340 [ 214.292220] sysfs_add_file_mode_ns+0x226/0x540 [ 214.296878] internal_create_group+0x355/0xb20 [ 214.301451] ? sysfs_remove_link_from_group+0x70/0x70 [ 214.306623] ? lock_downgrade+0x720/0x720 [ 214.310759] lo_ioctl+0xf7c/0x20e0 [ 214.314284] ? loop_set_status64+0x110/0x110 [ 214.318677] blkdev_ioctl+0x5cb/0x1a80 [ 214.322546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.327892] ? blkpg_ioctl+0x9d0/0x9d0 [ 214.331764] ? mark_held_locks+0xf0/0xf0 [ 214.335808] ? mark_held_locks+0xf0/0xf0 [ 214.339856] ? debug_check_no_obj_freed+0x201/0x490 [ 214.344856] ? lock_downgrade+0x720/0x720 [ 214.348989] block_ioctl+0xe9/0x130 [ 214.352599] ? blkdev_fallocate+0x3f0/0x3f0 [ 214.356901] do_vfs_ioctl+0xcdb/0x12e0 [ 214.360772] ? lock_downgrade+0x720/0x720 [ 214.364969] ? check_preemption_disabled+0x41/0x280 [ 214.369979] ? ioctl_preallocate+0x200/0x200 [ 214.374398] ? __fget+0x356/0x510 [ 214.377847] ? do_dup2+0x450/0x450 [ 214.381392] ? do_sys_open+0x2bf/0x520 [ 214.385266] ksys_ioctl+0x9b/0xc0 [ 214.388756] __x64_sys_ioctl+0x6f/0xb0 [ 214.392629] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 214.397194] do_syscall_64+0xf9/0x620 [ 214.400985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.406164] RIP: 0033:0x4658c7 [ 214.409361] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 214.428243] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 214.435973] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 214.443224] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 214.450472] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 214.457721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 214.464971] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:48:26 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 214.497955] erofs: read_super, device -> /dev/loop3 05:48:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 214.525586] erofs: options -> acl,noacl, [ 214.564171] FAULT_INJECTION: forcing a failure. [ 214.564171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 214.576017] CPU: 1 PID: 14852 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 214.583918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.593261] Call Trace: [ 214.595852] dump_stack+0x1fc/0x2ef [ 214.599482] should_fail.cold+0xa/0xf [ 214.603268] ? setup_fault_attr+0x200/0x200 [ 214.607597] ? do_writepages+0x290/0x290 [ 214.611642] ? unlock_page+0x13d/0x230 [ 214.615515] __alloc_pages_nodemask+0x239/0x2890 [ 214.620261] ? lock_downgrade+0x720/0x720 [ 214.624392] ? check_preemption_disabled+0x41/0x280 [ 214.629414] ? __lock_acquire+0x6de/0x3ff0 [ 214.633635] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 214.638462] ? lock_downgrade+0x720/0x720 [ 214.642592] ? lock_acquire+0x170/0x3c0 [ 214.646564] ? up_write+0x18/0x150 [ 214.650094] ? generic_file_write_iter+0x381/0x730 [ 214.655007] ? iov_iter_init+0xb8/0x1d0 [ 214.658970] cache_grow_begin+0xa4/0x8a0 [ 214.663018] ? setup_fault_attr+0x200/0x200 [ 214.667326] ? lock_acquire+0x170/0x3c0 [ 214.671286] cache_alloc_refill+0x273/0x340 [ 214.675593] kmem_cache_alloc+0x346/0x370 [ 214.679728] getname_flags+0xce/0x590 [ 214.683535] do_sys_open+0x26c/0x520 [ 214.687233] ? filp_open+0x70/0x70 [ 214.690783] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 214.696189] ? trace_hardirqs_off_caller+0x6e/0x210 [ 214.701201] ? do_syscall_64+0x21/0x620 [ 214.705161] do_syscall_64+0xf9/0x620 [ 214.708950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.714215] RIP: 0033:0x4190f4 [ 214.717396] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 214.736283] RSP: 002b:00007ff81a69ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 214.743976] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 214.751229] RDX: 0000000000000002 RSI: 00007ff81a69e000 RDI: 00000000ffffff9c [ 214.758479] RBP: 00007ff81a69e000 R08: 0000000000000000 R09: ffffffffffffffff [ 214.765736] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 214.773007] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:27 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100", 0x7, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 214.825412] erofs: unmounted for /dev/loop3 [ 214.873476] erofs: read_super, device -> /dev/loop0 [ 214.878541] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 214.883056] erofs: read_super, device -> /dev/loop5 [ 214.888676] erofs: read_super, device -> /dev/loop4 [ 214.907891] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 214.911461] erofs: options -> [ 214.925581] erofs: blksize 1 isn't supported on this platform [ 214.937319] erofs: root inode @ nid 36 05:48:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 215.014285] FAULT_INJECTION: forcing a failure. [ 215.014285] name failslab, interval 1, probability 0, space 0, times 0 [ 215.035878] CPU: 1 PID: 14868 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 215.043801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.053162] Call Trace: [ 215.055751] dump_stack+0x1fc/0x2ef [ 215.059368] should_fail.cold+0xa/0xf [ 215.063156] ? setup_fault_attr+0x200/0x200 [ 215.067465] ? lock_acquire+0x170/0x3c0 [ 215.071553] __should_failslab+0x115/0x180 [ 215.075775] should_failslab+0x5/0x10 [ 215.079579] kmem_cache_alloc+0x277/0x370 [ 215.083724] __kernfs_new_node+0xd2/0x680 [ 215.087870] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 215.092700] ? __mutex_unlock_slowpath+0xea/0x610 [ 215.097536] ? wait_for_completion_io+0x10/0x10 [ 215.102208] ? kernfs_next_descendant_post+0x19c/0x290 [ 215.107485] kernfs_new_node+0x92/0x120 [ 215.111454] __kernfs_create_file+0x51/0x340 [ 215.115852] sysfs_add_file_mode_ns+0x226/0x540 [ 215.120521] internal_create_group+0x355/0xb20 [ 215.125099] ? sysfs_remove_link_from_group+0x70/0x70 [ 215.130353] ? lock_downgrade+0x720/0x720 [ 215.134497] lo_ioctl+0xf7c/0x20e0 [ 215.138074] ? loop_set_status64+0x110/0x110 [ 215.142494] blkdev_ioctl+0x5cb/0x1a80 [ 215.146370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.151720] ? blkpg_ioctl+0x9d0/0x9d0 [ 215.155596] ? mark_held_locks+0xf0/0xf0 [ 215.159641] ? mark_held_locks+0xf0/0xf0 [ 215.163707] ? debug_check_no_obj_freed+0x201/0x490 [ 215.168723] ? lock_downgrade+0x720/0x720 [ 215.172858] block_ioctl+0xe9/0x130 [ 215.176467] ? blkdev_fallocate+0x3f0/0x3f0 [ 215.180776] do_vfs_ioctl+0xcdb/0x12e0 [ 215.184658] ? lock_downgrade+0x720/0x720 [ 215.188860] ? check_preemption_disabled+0x41/0x280 [ 215.193862] ? ioctl_preallocate+0x200/0x200 [ 215.198317] ? __fget+0x356/0x510 [ 215.201755] ? do_dup2+0x450/0x450 [ 215.205281] ? do_sys_open+0x2bf/0x520 [ 215.209172] ksys_ioctl+0x9b/0xc0 [ 215.212627] __x64_sys_ioctl+0x6f/0xb0 [ 215.216518] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 215.221093] do_syscall_64+0xf9/0x620 [ 215.224893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.230074] RIP: 0033:0x4658c7 [ 215.233255] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 215.252141] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:48:27 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 215.259840] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 215.267103] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 215.274366] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 215.281627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 215.289000] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 215.338764] erofs: read_super, device -> /dev/loop2 [ 215.350817] erofs: read_super, device -> /dev/loop3 [ 215.360666] erofs: options -> acl,noacl, [ 215.361523] erofs: read_super, device -> /dev/loop1 [ 215.369226] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:27 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 215.408925] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 215.420923] erofs: unmounted for /dev/loop3 [ 215.428799] FAULT_INJECTION: forcing a failure. [ 215.428799] name failslab, interval 1, probability 0, space 0, times 0 [ 215.441216] CPU: 1 PID: 14881 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 215.449120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.458473] Call Trace: [ 215.461056] dump_stack+0x1fc/0x2ef [ 215.464680] should_fail.cold+0xa/0xf [ 215.468476] ? setup_fault_attr+0x200/0x200 [ 215.472780] ? lock_acquire+0x170/0x3c0 [ 215.476743] __should_failslab+0x115/0x180 [ 215.480964] should_failslab+0x5/0x10 [ 215.484763] kmem_cache_alloc+0x277/0x370 [ 215.488909] __alloc_file+0x21/0x330 [ 215.492619] alloc_empty_file+0x6d/0x170 [ 215.496702] path_openat+0xe9/0x2df0 [ 215.500413] ? __lock_acquire+0x6de/0x3ff0 [ 215.504642] ? path_lookupat+0x8d0/0x8d0 [ 215.508688] ? mark_held_locks+0xf0/0xf0 [ 215.512734] do_filp_open+0x18c/0x3f0 [ 215.516516] ? may_open_dev+0xf0/0xf0 [ 215.520300] ? __alloc_fd+0x28d/0x570 [ 215.524085] ? lock_downgrade+0x720/0x720 [ 215.528326] ? lock_acquire+0x170/0x3c0 [ 215.532349] ? __alloc_fd+0x34/0x570 [ 215.536063] ? do_raw_spin_unlock+0x171/0x230 [ 215.540560] ? _raw_spin_unlock+0x29/0x40 [ 215.544694] ? __alloc_fd+0x28d/0x570 [ 215.548483] do_sys_open+0x3b3/0x520 [ 215.552181] ? filp_open+0x70/0x70 [ 215.555705] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 215.561057] ? trace_hardirqs_off_caller+0x6e/0x210 [ 215.566139] ? do_syscall_64+0x21/0x620 [ 215.570109] do_syscall_64+0xf9/0x620 [ 215.573950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.579137] RIP: 0033:0x4190f4 [ 215.582313] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 215.601196] RSP: 002b:00007ff81a69ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.608889] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 215.616142] RDX: 0000000000000002 RSI: 00007ff81a69e000 RDI: 00000000ffffff9c [ 215.623393] RBP: 00007ff81a69e000 R08: 0000000000000000 R09: ffffffffffffffff [ 215.630645] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 215.637897] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:27 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 215.702302] erofs: read_super, device -> /dev/loop0 [ 215.718936] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 215.729199] erofs: unmounted for /dev/loop1 [ 215.744214] erofs: read_super, device -> /dev/loop5 [ 215.759492] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 215.765018] FAULT_INJECTION: forcing a failure. [ 215.765018] name failslab, interval 1, probability 0, space 0, times 0 [ 215.777913] erofs: root inode @ nid 36 [ 215.783482] CPU: 1 PID: 14897 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 215.792068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.801429] Call Trace: [ 215.804023] dump_stack+0x1fc/0x2ef [ 215.807635] should_fail.cold+0xa/0xf [ 215.811433] ? setup_fault_attr+0x200/0x200 [ 215.815775] ? lock_acquire+0x170/0x3c0 [ 215.819747] __should_failslab+0x115/0x180 [ 215.823969] should_failslab+0x5/0x10 [ 215.827755] kmem_cache_alloc_trace+0x284/0x380 [ 215.832412] apparmor_file_alloc_security+0x394/0xad0 [ 215.837588] ? apparmor_file_receive+0x160/0x160 [ 215.842339] ? __alloc_file+0x21/0x330 [ 215.846218] security_file_alloc+0x40/0x90 [ 215.850439] __alloc_file+0xc9/0x330 [ 215.854137] alloc_empty_file+0x6d/0x170 [ 215.858185] path_openat+0xe9/0x2df0 [ 215.861883] ? __lock_acquire+0x6de/0x3ff0 [ 215.866128] ? path_lookupat+0x8d0/0x8d0 [ 215.870173] ? mark_held_locks+0xf0/0xf0 [ 215.874222] do_filp_open+0x18c/0x3f0 [ 215.878004] ? may_open_dev+0xf0/0xf0 [ 215.881799] ? __alloc_fd+0x28d/0x570 [ 215.885616] ? lock_downgrade+0x720/0x720 [ 215.889767] ? lock_acquire+0x170/0x3c0 [ 215.893723] ? __alloc_fd+0x34/0x570 [ 215.897422] ? do_raw_spin_unlock+0x171/0x230 [ 215.901924] ? _raw_spin_unlock+0x29/0x40 [ 215.906062] ? __alloc_fd+0x28d/0x570 [ 215.909850] do_sys_open+0x3b3/0x520 [ 215.913566] ? filp_open+0x70/0x70 [ 215.917091] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 215.922461] ? trace_hardirqs_off_caller+0x6e/0x210 [ 215.927472] ? do_syscall_64+0x21/0x620 [ 215.931439] do_syscall_64+0xf9/0x620 [ 215.935236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.940408] RIP: 0033:0x4190f4 [ 215.943584] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 215.962472] RSP: 002b:00007ff81a69ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.970166] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 215.977420] RDX: 0000000000000002 RSI: 00007ff81a69e000 RDI: 00000000ffffff9c [ 215.984674] RBP: 00007ff81a69e000 R08: 0000000000000000 R09: ffffffffffffffff [ 215.991953] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 215.999204] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 216.040479] FAULT_INJECTION: forcing a failure. [ 216.040479] name failslab, interval 1, probability 0, space 0, times 0 [ 216.064875] CPU: 1 PID: 14895 Comm: syz-executor.3 Not tainted 4.19.172-syzkaller #0 [ 216.072799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.082163] Call Trace: [ 216.084770] dump_stack+0x1fc/0x2ef 05:48:28 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 216.088409] should_fail.cold+0xa/0xf [ 216.092224] ? setup_fault_attr+0x200/0x200 [ 216.096544] ? lock_acquire+0x170/0x3c0 [ 216.100507] __should_failslab+0x115/0x180 [ 216.104728] should_failslab+0x5/0x10 [ 216.108512] kmem_cache_alloc+0x277/0x370 [ 216.112646] __kernfs_new_node+0xd2/0x680 [ 216.116791] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 216.121534] ? __mutex_unlock_slowpath+0xea/0x610 [ 216.126364] ? wait_for_completion_io+0x10/0x10 [ 216.131018] ? kernfs_next_descendant_post+0x19c/0x290 [ 216.136290] kernfs_new_node+0x92/0x120 [ 216.140251] __kernfs_create_file+0x51/0x340 [ 216.144647] sysfs_add_file_mode_ns+0x226/0x540 [ 216.149364] internal_create_group+0x355/0xb20 [ 216.153943] ? sysfs_remove_link_from_group+0x70/0x70 [ 216.159114] ? lock_downgrade+0x720/0x720 [ 216.163252] lo_ioctl+0xf7c/0x20e0 [ 216.166776] ? loop_set_status64+0x110/0x110 [ 216.171168] blkdev_ioctl+0x5cb/0x1a80 [ 216.175050] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.180402] ? blkpg_ioctl+0x9d0/0x9d0 [ 216.184274] ? mark_held_locks+0xf0/0xf0 [ 216.188318] ? mark_held_locks+0xf0/0xf0 [ 216.192364] ? debug_check_no_obj_freed+0x201/0x490 [ 216.197364] ? lock_downgrade+0x720/0x720 [ 216.201496] block_ioctl+0xe9/0x130 [ 216.205104] ? blkdev_fallocate+0x3f0/0x3f0 [ 216.209409] do_vfs_ioctl+0xcdb/0x12e0 [ 216.213284] ? lock_downgrade+0x720/0x720 [ 216.217418] ? check_preemption_disabled+0x41/0x280 [ 216.222420] ? ioctl_preallocate+0x200/0x200 [ 216.226814] ? __fget+0x356/0x510 [ 216.230250] ? do_dup2+0x450/0x450 [ 216.233771] ? do_sys_open+0x2bf/0x520 [ 216.237663] ksys_ioctl+0x9b/0xc0 [ 216.241112] __x64_sys_ioctl+0x6f/0xb0 [ 216.244983] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 216.249563] do_syscall_64+0xf9/0x620 [ 216.253357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.258537] RIP: 0033:0x4658c7 [ 216.261730] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 216.280631] RSP: 002b:00007f0db5b43f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.288332] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 216.295587] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 216.302844] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 216.310113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 216.317364] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:48:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 216.361570] erofs: read_super, device -> /dev/loop1 05:48:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 216.413950] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 216.435768] erofs: read_super, device -> /dev/loop2 [ 216.443650] erofs: read_super, device -> /dev/loop3 [ 216.448364] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 216.448771] erofs: options -> acl,noacl, [ 216.486385] FAULT_INJECTION: forcing a failure. [ 216.486385] name failslab, interval 1, probability 0, space 0, times 0 [ 216.498014] CPU: 0 PID: 14914 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 216.506025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.515372] Call Trace: [ 216.519974] dump_stack+0x1fc/0x2ef [ 216.523600] should_fail.cold+0xa/0xf [ 216.527385] ? setup_fault_attr+0x200/0x200 [ 216.531745] ? lock_acquire+0x170/0x3c0 [ 216.535722] __should_failslab+0x115/0x180 [ 216.539953] should_failslab+0x5/0x10 [ 216.543739] kmem_cache_alloc_trace+0x284/0x380 [ 216.548392] ? loop_info64_to_compat+0x5e0/0x5e0 [ 216.553141] __kthread_create_on_node+0xd2/0x410 [ 216.557896] ? kthread_parkme+0xa0/0xa0 [ 216.561865] ? lo_ioctl+0x1bb/0x20e0 [ 216.565568] ? __mutex_lock+0x3a8/0x1260 [ 216.569616] ? lock_downgrade+0x720/0x720 [ 216.573763] ? loop_info64_to_compat+0x5e0/0x5e0 [ 216.578512] kthread_create_on_node+0xbb/0xf0 [ 216.582991] ? __kthread_create_on_node+0x410/0x410 [ 216.587999] ? __fget+0x356/0x510 [ 216.591526] ? do_dup2+0x450/0x450 [ 216.595086] ? __lockdep_init_map+0x100/0x5a0 [ 216.599578] ? __lockdep_init_map+0x100/0x5a0 [ 216.604060] lo_ioctl+0xae5/0x20e0 [ 216.607587] ? loop_set_status64+0x110/0x110 [ 216.611980] blkdev_ioctl+0x5cb/0x1a80 [ 216.615864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.621222] ? blkpg_ioctl+0x9d0/0x9d0 [ 216.625097] ? mark_held_locks+0xf0/0xf0 [ 216.629140] ? mark_held_locks+0xf0/0xf0 [ 216.633184] ? debug_check_no_obj_freed+0x201/0x490 [ 216.638202] ? lock_downgrade+0x720/0x720 [ 216.642342] block_ioctl+0xe9/0x130 [ 216.645952] ? blkdev_fallocate+0x3f0/0x3f0 [ 216.650258] do_vfs_ioctl+0xcdb/0x12e0 [ 216.654139] ? lock_downgrade+0x720/0x720 [ 216.658292] ? check_preemption_disabled+0x41/0x280 [ 216.663295] ? ioctl_preallocate+0x200/0x200 [ 216.667694] ? __fget+0x356/0x510 [ 216.671132] ? do_dup2+0x450/0x450 [ 216.674665] ? do_sys_open+0x2bf/0x520 [ 216.678563] ksys_ioctl+0x9b/0xc0 [ 216.682021] __x64_sys_ioctl+0x6f/0xb0 [ 216.685903] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 216.690476] do_syscall_64+0xf9/0x620 [ 216.694284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.699470] RIP: 0033:0x4658c7 [ 216.702647] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 216.721532] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.729229] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 05:48:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 216.736489] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 216.743752] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 216.751006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 216.758272] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:29 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 216.877529] erofs: unmounted for /dev/loop3 [ 216.971889] erofs: read_super, device -> /dev/loop2 [ 216.977168] erofs: read_super, device -> /dev/loop0 [ 216.977849] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 216.982205] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 216.997426] erofs: read_super, device -> /dev/loop5 [ 217.015820] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 217.031655] erofs: root inode @ nid 36 [ 217.051870] FAULT_INJECTION: forcing a failure. [ 217.051870] name failslab, interval 1, probability 0, space 0, times 0 [ 217.063754] CPU: 0 PID: 14937 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 217.071634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.080977] Call Trace: [ 217.083556] dump_stack+0x1fc/0x2ef [ 217.087187] should_fail.cold+0xa/0xf [ 217.090984] ? setup_fault_attr+0x200/0x200 [ 217.095289] ? lock_acquire+0x170/0x3c0 [ 217.099267] __should_failslab+0x115/0x180 [ 217.103503] should_failslab+0x5/0x10 [ 217.107302] kmem_cache_alloc+0x277/0x370 [ 217.111533] __kernfs_new_node+0xd2/0x680 [ 217.115730] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 217.120468] ? kernfs_activate+0x2c/0x1d0 [ 217.124601] ? lock_downgrade+0x720/0x720 [ 217.128746] ? kernfs_add_one+0x51/0x4c0 [ 217.132828] ? __mutex_add_waiter+0x160/0x160 [ 217.137321] ? __mutex_unlock_slowpath+0xea/0x610 [ 217.142215] kernfs_new_node+0x92/0x120 [ 217.146194] __kernfs_create_file+0x51/0x340 [ 217.150603] sysfs_add_file_mode_ns+0x226/0x540 [ 217.155263] internal_create_group+0x355/0xb20 [ 217.159863] ? sysfs_remove_link_from_group+0x70/0x70 [ 217.165054] ? lock_downgrade+0x720/0x720 [ 217.169218] lo_ioctl+0xf7c/0x20e0 [ 217.172768] ? loop_set_status64+0x110/0x110 [ 217.177189] blkdev_ioctl+0x5cb/0x1a80 [ 217.181077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.186436] ? blkpg_ioctl+0x9d0/0x9d0 [ 217.190320] ? mark_held_locks+0xf0/0xf0 [ 217.194467] ? mark_held_locks+0xf0/0xf0 [ 217.198530] ? debug_check_no_obj_freed+0x201/0x490 [ 217.203557] ? lock_downgrade+0x720/0x720 [ 217.207718] block_ioctl+0xe9/0x130 [ 217.211341] ? blkdev_fallocate+0x3f0/0x3f0 [ 217.215650] do_vfs_ioctl+0xcdb/0x12e0 [ 217.219525] ? lock_downgrade+0x720/0x720 [ 217.223658] ? check_preemption_disabled+0x41/0x280 [ 217.228671] ? ioctl_preallocate+0x200/0x200 [ 217.233087] ? __fget+0x356/0x510 [ 217.236539] ? do_dup2+0x450/0x450 [ 217.240076] ? do_sys_open+0x2bf/0x520 [ 217.243949] ksys_ioctl+0x9b/0xc0 [ 217.247399] __x64_sys_ioctl+0x6f/0xb0 [ 217.251296] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 217.255920] do_syscall_64+0xf9/0x620 [ 217.259706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.264884] RIP: 0033:0x4658c7 [ 217.268082] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.286987] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.294719] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 217.301987] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 217.309559] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 217.316827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 217.324089] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 217.403195] erofs: read_super, device -> /dev/loop4 [ 217.414011] erofs: read_super, device -> /dev/loop1 [ 217.419486] erofs: read_super, device -> /dev/loop3 [ 217.421952] erofs: options -> [ 217.424515] erofs: options -> acl,noacl, [ 217.458618] erofs: blksize 1 isn't supported on this platform [ 217.467450] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 217.545259] erofs: unmounted for /dev/loop3 05:48:29 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 217.630826] erofs: read_super, device -> /dev/loop0 [ 217.640515] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 217.649737] erofs: read_super, device -> /dev/loop5 [ 217.661609] erofs: read_super, device -> /dev/loop2 [ 217.666607] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 217.671974] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 217.720699] erofs: root inode @ nid 36 [ 217.757388] FAULT_INJECTION: forcing a failure. [ 217.757388] name failslab, interval 1, probability 0, space 0, times 0 [ 217.769043] CPU: 1 PID: 14969 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 217.776945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.786307] Call Trace: [ 217.788903] dump_stack+0x1fc/0x2ef [ 217.792522] should_fail.cold+0xa/0xf [ 217.796345] ? setup_fault_attr+0x200/0x200 [ 217.800664] ? lock_acquire+0x170/0x3c0 [ 217.804638] __should_failslab+0x115/0x180 [ 217.808867] should_failslab+0x5/0x10 [ 217.812740] kmem_cache_alloc+0x277/0x370 [ 217.816881] __kernfs_new_node+0xd2/0x680 [ 217.821030] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 217.825776] ? kernfs_activate+0x2c/0x1d0 [ 217.829922] ? lock_downgrade+0x720/0x720 [ 217.834062] ? kernfs_add_one+0x51/0x4c0 [ 217.838123] ? __mutex_add_waiter+0x160/0x160 [ 217.842639] ? __mutex_unlock_slowpath+0xea/0x610 [ 217.847491] kernfs_new_node+0x92/0x120 [ 217.851584] __kernfs_create_file+0x51/0x340 [ 217.856002] sysfs_add_file_mode_ns+0x226/0x540 [ 217.860672] internal_create_group+0x355/0xb20 [ 217.865259] ? sysfs_remove_link_from_group+0x70/0x70 [ 217.870447] ? lock_downgrade+0x720/0x720 [ 217.874596] lo_ioctl+0xf7c/0x20e0 [ 217.878139] ? loop_set_status64+0x110/0x110 [ 217.882599] blkdev_ioctl+0x5cb/0x1a80 [ 217.886485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.891843] ? blkpg_ioctl+0x9d0/0x9d0 [ 217.895716] ? mark_held_locks+0xf0/0xf0 [ 217.899774] ? mark_held_locks+0xf0/0xf0 [ 217.903834] ? debug_check_no_obj_freed+0x201/0x490 [ 217.908840] ? lock_downgrade+0x720/0x720 [ 217.912980] block_ioctl+0xe9/0x130 [ 217.916600] ? blkdev_fallocate+0x3f0/0x3f0 [ 217.920957] do_vfs_ioctl+0xcdb/0x12e0 [ 217.924846] ? lock_downgrade+0x720/0x720 [ 217.928983] ? check_preemption_disabled+0x41/0x280 [ 217.933987] ? ioctl_preallocate+0x200/0x200 [ 217.938393] ? __fget+0x356/0x510 [ 217.941952] ? do_dup2+0x450/0x450 [ 217.945518] ? do_sys_open+0x2bf/0x520 [ 217.949469] ksys_ioctl+0x9b/0xc0 [ 217.952912] __x64_sys_ioctl+0x6f/0xb0 [ 217.956790] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 217.961358] do_syscall_64+0xf9/0x620 [ 217.965147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.970318] RIP: 0033:0x4658c7 [ 217.973500] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.992391] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.000087] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 05:48:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 218.007342] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 218.014599] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 218.021873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 218.029125] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 218.045439] erofs: read_super, device -> /dev/loop4 [ 218.050926] erofs: options -> [ 218.091006] erofs: blksize 1 isn't supported on this platform [ 218.097576] erofs: read_super, device -> /dev/loop3 [ 218.102616] erofs: options -> acl,noacl, [ 218.104848] erofs: read_super, device -> /dev/loop1 05:48:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 218.135707] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 218.207376] erofs: read_super, device -> /dev/loop2 [ 218.212434] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 218.237518] erofs: unmounted for /dev/loop3 05:48:30 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 218.271132] erofs: read_super, device -> /dev/loop0 [ 218.276253] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 218.298927] erofs: read_super, device -> /dev/loop5 05:48:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 218.335344] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 218.354763] erofs: root inode @ nid 36 05:48:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 218.377968] erofs: read_super, device -> /dev/loop1 [ 218.383148] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 218.413392] erofs: read_super, device -> /dev/loop3 [ 218.422447] FAULT_INJECTION: forcing a failure. [ 218.422447] name failslab, interval 1, probability 0, space 0, times 0 [ 218.423298] erofs: options -> acl,noacl, [ 218.440923] CPU: 0 PID: 15014 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 218.448825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.458183] Call Trace: [ 218.460787] dump_stack+0x1fc/0x2ef [ 218.464425] should_fail.cold+0xa/0xf [ 218.468232] ? setup_fault_attr+0x200/0x200 [ 218.472539] ? lock_acquire+0x170/0x3c0 [ 218.476500] __should_failslab+0x115/0x180 [ 218.480843] should_failslab+0x5/0x10 [ 218.484654] kmem_cache_alloc+0x277/0x370 [ 218.488798] __kernfs_new_node+0xd2/0x680 [ 218.492955] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 218.497713] ? __mutex_unlock_slowpath+0xea/0x610 [ 218.502553] ? wait_for_completion_io+0x10/0x10 [ 218.507295] ? kernfs_next_descendant_post+0x19c/0x290 [ 218.512573] kernfs_new_node+0x92/0x120 [ 218.516536] __kernfs_create_file+0x51/0x340 [ 218.520955] sysfs_add_file_mode_ns+0x226/0x540 [ 218.525625] internal_create_group+0x355/0xb20 [ 218.530198] ? sysfs_remove_link_from_group+0x70/0x70 [ 218.535372] ? lock_downgrade+0x720/0x720 [ 218.539533] lo_ioctl+0xf7c/0x20e0 [ 218.543083] ? loop_set_status64+0x110/0x110 [ 218.547487] blkdev_ioctl+0x5cb/0x1a80 [ 218.551358] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.556768] ? blkpg_ioctl+0x9d0/0x9d0 [ 218.560657] ? mark_held_locks+0xf0/0xf0 [ 218.564714] ? mark_held_locks+0xf0/0xf0 [ 218.568777] ? debug_check_no_obj_freed+0x201/0x490 [ 218.573788] ? lock_downgrade+0x720/0x720 [ 218.577925] block_ioctl+0xe9/0x130 [ 218.581553] ? blkdev_fallocate+0x3f0/0x3f0 [ 218.585868] do_vfs_ioctl+0xcdb/0x12e0 [ 218.589744] ? lock_downgrade+0x720/0x720 [ 218.593874] ? check_preemption_disabled+0x41/0x280 [ 218.598888] ? ioctl_preallocate+0x200/0x200 [ 218.603290] ? __fget+0x356/0x510 [ 218.606728] ? do_dup2+0x450/0x450 [ 218.610251] ? do_sys_open+0x2bf/0x520 [ 218.614123] ksys_ioctl+0x9b/0xc0 [ 218.617558] __x64_sys_ioctl+0x6f/0xb0 [ 218.621440] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 218.626012] do_syscall_64+0xf9/0x620 [ 218.629795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.634967] RIP: 0033:0x4658c7 [ 218.638148] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 218.657041] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.664730] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 218.671978] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 218.679231] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 218.686484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 218.693734] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 218.730039] erofs: read_super, device -> /dev/loop4 [ 218.735477] erofs: read_super, device -> /dev/loop2 [ 218.748816] erofs: read_super, device -> /dev/loop0 [ 218.751686] erofs: options -> [ 218.761075] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 218.767390] erofs: blksize 1 isn't supported on this platform 05:48:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 218.769901] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 218.813419] erofs: unmounted for /dev/loop1 [ 218.817896] erofs: unmounted for /dev/loop3 05:48:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:31 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 218.990886] erofs: read_super, device -> /dev/loop1 [ 218.992234] erofs: read_super, device -> /dev/loop5 [ 218.996185] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 219.010935] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 219.020167] erofs: root inode @ nid 36 05:48:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 219.037215] erofs: read_super, device -> /dev/loop3 05:48:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 219.077092] erofs: read_super, device -> /dev/loop0 [ 219.079256] erofs: read_super, device -> /dev/loop2 [ 219.099241] erofs: options -> acl,noacl, [ 219.103905] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 219.112861] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 219.155151] FAULT_INJECTION: forcing a failure. [ 219.155151] name failslab, interval 1, probability 0, space 0, times 0 [ 219.167829] CPU: 0 PID: 15056 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 219.175732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.185083] Call Trace: [ 219.187676] dump_stack+0x1fc/0x2ef [ 219.191311] should_fail.cold+0xa/0xf [ 219.195129] ? setup_fault_attr+0x200/0x200 [ 219.199465] ? lock_acquire+0x170/0x3c0 [ 219.203451] __should_failslab+0x115/0x180 [ 219.207693] should_failslab+0x5/0x10 [ 219.211494] kmem_cache_alloc+0x277/0x370 [ 219.215650] __kernfs_new_node+0xd2/0x680 [ 219.219806] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 219.224564] ? __mutex_unlock_slowpath+0xea/0x610 [ 219.229439] ? wait_for_completion_io+0x10/0x10 [ 219.234117] ? kernfs_next_descendant_post+0x19c/0x290 [ 219.239402] kernfs_new_node+0x92/0x120 [ 219.243383] __kernfs_create_file+0x51/0x340 [ 219.247786] sysfs_add_file_mode_ns+0x226/0x540 [ 219.252466] internal_create_group+0x355/0xb20 [ 219.257057] ? sysfs_remove_link_from_group+0x70/0x70 [ 219.262347] ? lock_downgrade+0x720/0x720 [ 219.266519] lo_ioctl+0xf7c/0x20e0 [ 219.270062] ? loop_set_status64+0x110/0x110 [ 219.274479] blkdev_ioctl+0x5cb/0x1a80 [ 219.278365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.283730] ? blkpg_ioctl+0x9d0/0x9d0 [ 219.287622] ? mark_held_locks+0xf0/0xf0 [ 219.291687] ? mark_held_locks+0xf0/0xf0 [ 219.295761] ? debug_check_no_obj_freed+0x201/0x490 [ 219.300783] ? lock_downgrade+0x720/0x720 [ 219.304935] block_ioctl+0xe9/0x130 [ 219.308559] ? blkdev_fallocate+0x3f0/0x3f0 [ 219.312878] do_vfs_ioctl+0xcdb/0x12e0 [ 219.316767] ? lock_downgrade+0x720/0x720 [ 219.320908] ? check_preemption_disabled+0x41/0x280 [ 219.325914] ? ioctl_preallocate+0x200/0x200 [ 219.330325] ? __fget+0x356/0x510 [ 219.333775] ? do_dup2+0x450/0x450 [ 219.337306] ? do_sys_open+0x2bf/0x520 [ 219.341190] ksys_ioctl+0x9b/0xc0 [ 219.344637] __x64_sys_ioctl+0x6f/0xb0 [ 219.348519] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 219.353098] do_syscall_64+0xf9/0x620 [ 219.356903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.362086] RIP: 0033:0x4658c7 [ 219.365268] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 219.384162] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 219.391867] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 219.399136] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 219.406404] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 219.414452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 219.421720] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 219.463354] erofs: read_super, device -> /dev/loop4 [ 219.468666] erofs: options -> [ 219.472578] erofs: blksize 1 isn't supported on this platform 05:48:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 219.511011] erofs: read_super, device -> /dev/loop5 [ 219.518620] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 219.531355] erofs: root inode @ nid 36 05:48:31 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 219.564774] erofs: read_super, device -> /dev/loop1 [ 219.572518] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 219.631121] erofs: unmounted for /dev/loop3 [ 219.653769] erofs: read_super, device -> /dev/loop0 [ 219.671801] erofs: read_super, device -> /dev/loop2 05:48:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 219.695588] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 219.704182] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 219.784051] FAULT_INJECTION: forcing a failure. [ 219.784051] name failslab, interval 1, probability 0, space 0, times 0 [ 219.795540] CPU: 0 PID: 15088 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 219.803419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.812772] Call Trace: [ 219.815378] dump_stack+0x1fc/0x2ef [ 219.819010] should_fail.cold+0xa/0xf [ 219.822809] ? setup_fault_attr+0x200/0x200 [ 219.827118] ? lock_acquire+0x170/0x3c0 [ 219.831095] __should_failslab+0x115/0x180 [ 219.835343] should_failslab+0x5/0x10 [ 219.839139] kmem_cache_alloc+0x277/0x370 [ 219.843277] __kernfs_new_node+0xd2/0x680 [ 219.847438] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 219.852199] ? __mutex_unlock_slowpath+0xea/0x610 [ 219.857041] ? wait_for_completion_io+0x10/0x10 [ 219.861706] ? kernfs_next_descendant_post+0x19c/0x290 [ 219.866988] kernfs_new_node+0x92/0x120 [ 219.870973] __kernfs_create_file+0x51/0x340 [ 219.875401] sysfs_add_file_mode_ns+0x226/0x540 [ 219.880070] internal_create_group+0x355/0xb20 [ 219.884657] ? sysfs_remove_link_from_group+0x70/0x70 [ 219.889844] ? lock_downgrade+0x720/0x720 [ 219.893999] lo_ioctl+0xf7c/0x20e0 [ 219.897551] ? loop_set_status64+0x110/0x110 [ 219.901970] blkdev_ioctl+0x5cb/0x1a80 [ 219.905901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.911264] ? blkpg_ioctl+0x9d0/0x9d0 [ 219.915161] ? mark_held_locks+0xf0/0xf0 [ 219.919219] ? mark_held_locks+0xf0/0xf0 [ 219.923283] ? debug_check_no_obj_freed+0x201/0x490 [ 219.928359] ? lock_downgrade+0x720/0x720 [ 219.932505] block_ioctl+0xe9/0x130 [ 219.936135] ? blkdev_fallocate+0x3f0/0x3f0 [ 219.940452] do_vfs_ioctl+0xcdb/0x12e0 [ 219.944334] ? lock_downgrade+0x720/0x720 [ 219.948475] ? check_preemption_disabled+0x41/0x280 [ 219.953487] ? ioctl_preallocate+0x200/0x200 [ 219.957891] ? __fget+0x356/0x510 [ 219.961328] ? do_dup2+0x450/0x450 [ 219.964853] ? do_sys_open+0x2bf/0x520 [ 219.968728] ksys_ioctl+0x9b/0xc0 [ 219.972181] __x64_sys_ioctl+0x6f/0xb0 [ 219.976079] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 219.980671] do_syscall_64+0xf9/0x620 [ 219.984473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.989646] RIP: 0033:0x4658c7 [ 219.992836] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 220.011747] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.019581] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 220.026852] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 220.034123] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 220.041400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 220.048780] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 220.066415] erofs: read_super, device -> /dev/loop5 [ 220.071614] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 220.073083] erofs: read_super, device -> /dev/loop3 [ 220.080858] erofs: root inode @ nid 36 [ 220.085976] erofs: read_super, device -> /dev/loop1 [ 220.090036] erofs: read_super, device -> /dev/loop4 [ 220.100809] erofs: options -> [ 220.105381] erofs: blksize 1 isn't supported on this platform 05:48:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000", 0x10, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 220.131395] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:32 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 220.158133] erofs: options -> acl,noacl, [ 220.198238] erofs: read_super, device -> /dev/loop2 05:48:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:32 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 220.224060] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 220.256193] erofs: unmounted for /dev/loop3 [ 220.330211] erofs: read_super, device -> /dev/loop0 [ 220.337249] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 220.340724] FAULT_INJECTION: forcing a failure. [ 220.340724] name failslab, interval 1, probability 0, space 0, times 0 [ 220.367619] CPU: 0 PID: 15118 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 220.375550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.384899] Call Trace: [ 220.387490] dump_stack+0x1fc/0x2ef [ 220.391104] should_fail.cold+0xa/0xf [ 220.394892] ? setup_fault_attr+0x200/0x200 [ 220.399197] ? lock_acquire+0x170/0x3c0 [ 220.403160] __should_failslab+0x115/0x180 [ 220.407380] should_failslab+0x5/0x10 [ 220.411165] kmem_cache_alloc+0x277/0x370 [ 220.415300] __kernfs_new_node+0xd2/0x680 [ 220.419434] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 220.424182] ? __mutex_unlock_slowpath+0xea/0x610 [ 220.429008] ? wait_for_completion_io+0x10/0x10 [ 220.433664] ? kernfs_next_descendant_post+0x19c/0x290 [ 220.438929] kernfs_new_node+0x92/0x120 [ 220.442908] __kernfs_create_file+0x51/0x340 [ 220.447329] sysfs_add_file_mode_ns+0x226/0x540 [ 220.452007] internal_create_group+0x355/0xb20 [ 220.456930] ? sysfs_remove_link_from_group+0x70/0x70 [ 220.462104] ? lock_downgrade+0x720/0x720 [ 220.466259] lo_ioctl+0xf7c/0x20e0 [ 220.469859] ? loop_set_status64+0x110/0x110 [ 220.474256] blkdev_ioctl+0x5cb/0x1a80 [ 220.478130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.483478] ? blkpg_ioctl+0x9d0/0x9d0 [ 220.487364] ? mark_held_locks+0xf0/0xf0 [ 220.491420] ? mark_held_locks+0xf0/0xf0 [ 220.495482] ? debug_check_no_obj_freed+0x201/0x490 [ 220.500497] ? lock_downgrade+0x720/0x720 [ 220.504631] block_ioctl+0xe9/0x130 [ 220.508242] ? blkdev_fallocate+0x3f0/0x3f0 [ 220.512545] do_vfs_ioctl+0xcdb/0x12e0 [ 220.516417] ? lock_downgrade+0x720/0x720 [ 220.520551] ? check_preemption_disabled+0x41/0x280 [ 220.525553] ? ioctl_preallocate+0x200/0x200 [ 220.529951] ? __fget+0x356/0x510 [ 220.533393] ? do_dup2+0x450/0x450 [ 220.536928] ? do_sys_open+0x2bf/0x520 [ 220.540813] ksys_ioctl+0x9b/0xc0 [ 220.544251] __x64_sys_ioctl+0x6f/0xb0 [ 220.548131] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 220.552706] do_syscall_64+0xf9/0x620 [ 220.556494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.561666] RIP: 0033:0x4658c7 [ 220.564842] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 220.583729] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.591422] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 220.598679] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 220.605932] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 220.613185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 220.620440] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 220.667566] erofs: read_super, device -> /dev/loop4 [ 220.675908] erofs: options -> [ 220.680150] erofs: blksize 1 isn't supported on this platform [ 220.681769] erofs: read_super, device -> /dev/loop3 [ 220.695981] erofs: read_super, device -> /dev/loop1 [ 220.701010] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 220.709513] erofs: read_super, device -> /dev/loop2 05:48:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 220.725360] erofs: read_super, device -> /dev/loop5 [ 220.728707] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 220.730840] erofs: options -> acl,noacl, [ 220.756478] erofs: unmounted for /dev/loop0 [ 220.759767] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 220.772951] erofs: cannot find valid erofs superblock 05:48:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:33 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 220.954662] FAULT_INJECTION: forcing a failure. [ 220.954662] name failslab, interval 1, probability 0, space 0, times 0 [ 220.966026] CPU: 0 PID: 15150 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 220.973920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.983283] Call Trace: [ 220.985884] dump_stack+0x1fc/0x2ef [ 220.989525] should_fail.cold+0xa/0xf [ 220.993328] ? setup_fault_attr+0x200/0x200 [ 220.997634] ? lock_acquire+0x170/0x3c0 [ 221.001597] __should_failslab+0x115/0x180 [ 221.005832] should_failslab+0x5/0x10 [ 221.009627] kmem_cache_alloc+0x277/0x370 [ 221.013771] __kernfs_new_node+0xd2/0x680 [ 221.017908] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 221.022655] ? __mutex_unlock_slowpath+0xea/0x610 [ 221.027509] ? wait_for_completion_io+0x10/0x10 [ 221.032179] ? kernfs_next_descendant_post+0x19c/0x290 [ 221.037460] kernfs_new_node+0x92/0x120 [ 221.041434] __kernfs_create_file+0x51/0x340 [ 221.045846] sysfs_add_file_mode_ns+0x226/0x540 [ 221.050514] internal_create_group+0x355/0xb20 [ 221.055090] ? sysfs_remove_link_from_group+0x70/0x70 [ 221.061395] ? lock_downgrade+0x720/0x720 [ 221.065551] lo_ioctl+0xf7c/0x20e0 [ 221.069087] ? loop_set_status64+0x110/0x110 [ 221.073483] blkdev_ioctl+0x5cb/0x1a80 [ 221.077365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.082724] ? blkpg_ioctl+0x9d0/0x9d0 [ 221.086613] ? mark_held_locks+0xf0/0xf0 [ 221.090682] ? mark_held_locks+0xf0/0xf0 [ 221.094743] ? debug_check_no_obj_freed+0x201/0x490 [ 221.099747] ? lock_downgrade+0x720/0x720 [ 221.103901] block_ioctl+0xe9/0x130 [ 221.107534] ? blkdev_fallocate+0x3f0/0x3f0 [ 221.111857] do_vfs_ioctl+0xcdb/0x12e0 [ 221.115821] ? lock_downgrade+0x720/0x720 [ 221.119956] ? check_preemption_disabled+0x41/0x280 [ 221.124973] ? ioctl_preallocate+0x200/0x200 [ 221.129379] ? __fget+0x356/0x510 [ 221.132819] ? do_dup2+0x450/0x450 [ 221.136344] ? do_sys_open+0x2bf/0x520 [ 221.140223] ksys_ioctl+0x9b/0xc0 [ 221.143680] __x64_sys_ioctl+0x6f/0xb0 [ 221.147601] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 221.152180] do_syscall_64+0xf9/0x620 [ 221.155970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.161141] RIP: 0033:0x4658c7 [ 221.164330] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 221.183229] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 221.190934] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 221.198192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 221.205457] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 221.212719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 221.219971] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 221.248268] erofs: read_super, device -> /dev/loop2 [ 221.260722] erofs: unmounted for /dev/loop3 [ 221.264556] erofs: read_super, device -> /dev/loop4 [ 221.270108] erofs: options -> [ 221.273386] erofs: blksize 1 isn't supported on this platform [ 221.279411] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 221.404147] erofs: read_super, device -> /dev/loop1 [ 221.409329] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 221.415175] erofs: read_super, device -> /dev/loop3 [ 221.423070] erofs: options -> acl,noacl, [ 221.431390] erofs: read_super, device -> /dev/loop0 [ 221.432594] erofs: read_super, device -> /dev/loop5 05:48:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:33 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 221.446816] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 221.473688] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 221.508879] erofs: unmounted for /dev/loop3 [ 221.523625] erofs: cannot find valid erofs superblock 05:48:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 221.557915] FAULT_INJECTION: forcing a failure. [ 221.557915] name failslab, interval 1, probability 0, space 0, times 0 [ 221.569534] CPU: 0 PID: 15187 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 221.577525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.586888] Call Trace: [ 221.589490] dump_stack+0x1fc/0x2ef [ 221.593110] should_fail.cold+0xa/0xf [ 221.596971] ? is_bpf_text_address+0xfc/0x1b0 [ 221.601455] ? setup_fault_attr+0x200/0x200 [ 221.605774] ? kernel_text_address+0xbd/0xf0 [ 221.610180] ? __kernel_text_address+0x9/0x30 [ 221.614663] ? unwind_get_return_address+0x51/0x90 [ 221.619582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.624946] __should_failslab+0x115/0x180 [ 221.629195] should_failslab+0x5/0x10 [ 221.632990] kmem_cache_alloc+0x3f/0x370 [ 221.637043] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 221.642657] idr_get_free+0x50e/0xa10 [ 221.646472] idr_alloc_u32+0x1a5/0x320 [ 221.650370] ? __fprop_inc_percpu_max+0x210/0x210 [ 221.655209] ? node_tag_clear+0xb5/0x1b0 [ 221.659266] ? should_fail+0x142/0x7b0 [ 221.663138] ? fs_reclaim_release+0xd0/0x110 [ 221.667548] idr_alloc_cyclic+0x102/0x230 [ 221.671693] ? idr_alloc+0x130/0x130 [ 221.675394] ? __kernfs_new_node+0xf9/0x680 [ 221.679704] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 221.684721] __kernfs_new_node+0x11a/0x680 [ 221.688968] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 221.693734] ? __mutex_unlock_slowpath+0xea/0x610 [ 221.698569] ? wait_for_completion_io+0x10/0x10 [ 221.703226] ? kernfs_next_descendant_post+0x19c/0x290 [ 221.708507] kernfs_new_node+0x92/0x120 [ 221.712478] __kernfs_create_file+0x51/0x340 [ 221.716874] sysfs_add_file_mode_ns+0x226/0x540 [ 221.721534] internal_create_group+0x355/0xb20 [ 221.726124] ? sysfs_remove_link_from_group+0x70/0x70 [ 221.731324] ? lock_downgrade+0x720/0x720 [ 221.735472] lo_ioctl+0xf7c/0x20e0 [ 221.739000] ? loop_set_status64+0x110/0x110 [ 221.743393] blkdev_ioctl+0x5cb/0x1a80 [ 221.747277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.752636] ? blkpg_ioctl+0x9d0/0x9d0 [ 221.756510] ? mark_held_locks+0xf0/0xf0 [ 221.760556] ? mark_held_locks+0xf0/0xf0 [ 221.764621] ? debug_check_no_obj_freed+0x201/0x490 [ 221.769651] ? lock_downgrade+0x720/0x720 [ 221.773788] block_ioctl+0xe9/0x130 [ 221.777411] ? blkdev_fallocate+0x3f0/0x3f0 [ 221.781735] do_vfs_ioctl+0xcdb/0x12e0 [ 221.785630] ? lock_downgrade+0x720/0x720 [ 221.789783] ? check_preemption_disabled+0x41/0x280 [ 221.794799] ? ioctl_preallocate+0x200/0x200 [ 221.799199] ? __fget+0x356/0x510 [ 221.802639] ? do_dup2+0x450/0x450 [ 221.806173] ? do_sys_open+0x2bf/0x520 [ 221.810060] ksys_ioctl+0x9b/0xc0 [ 221.813499] __x64_sys_ioctl+0x6f/0xb0 [ 221.817372] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 221.821938] do_syscall_64+0xf9/0x620 [ 221.825735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.830915] RIP: 0033:0x4658c7 [ 221.834090] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 221.852976] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 221.860671] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 221.867938] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 221.875218] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 221.882481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 221.889744] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 221.915213] erofs: read_super, device -> /dev/loop2 [ 221.920270] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 221.959595] erofs: read_super, device -> /dev/loop4 [ 221.964652] erofs: options -> [ 221.972954] erofs: blksize 1 isn't supported on this platform [ 222.076034] erofs: read_super, device -> /dev/loop3 [ 222.081176] erofs: options -> acl,noacl, [ 222.089670] erofs: read_super, device -> /dev/loop0 [ 222.094717] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 222.095636] erofs: read_super, device -> /dev/loop1 05:48:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:34 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0410000", 0x8, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 222.141053] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 222.177074] erofs: unmounted for /dev/loop3 [ 222.236956] FAULT_INJECTION: forcing a failure. [ 222.236956] name failslab, interval 1, probability 0, space 0, times 0 [ 222.248533] CPU: 1 PID: 15215 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 222.256505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.265851] Call Trace: [ 222.268435] dump_stack+0x1fc/0x2ef [ 222.272065] should_fail.cold+0xa/0xf [ 222.275863] ? setup_fault_attr+0x200/0x200 [ 222.280179] ? lock_acquire+0x170/0x3c0 [ 222.284150] __should_failslab+0x115/0x180 [ 222.288373] should_failslab+0x5/0x10 [ 222.292157] __kmalloc+0x2ab/0x3c0 [ 222.295835] ? kobject_get_path+0xbf/0x240 [ 222.300073] kobject_get_path+0xbf/0x240 [ 222.304180] kobject_uevent_env+0x25c/0x14a0 [ 222.308593] lo_ioctl+0xff9/0x20e0 [ 222.312122] ? loop_set_status64+0x110/0x110 [ 222.316520] blkdev_ioctl+0x5cb/0x1a80 [ 222.320393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.325760] ? blkpg_ioctl+0x9d0/0x9d0 [ 222.329643] ? mark_held_locks+0xf0/0xf0 [ 222.333688] ? mark_held_locks+0xf0/0xf0 [ 222.337743] ? debug_check_no_obj_freed+0x201/0x490 [ 222.342750] ? lock_downgrade+0x720/0x720 [ 222.346892] block_ioctl+0xe9/0x130 [ 222.350507] ? blkdev_fallocate+0x3f0/0x3f0 [ 222.354821] do_vfs_ioctl+0xcdb/0x12e0 [ 222.358708] ? lock_downgrade+0x720/0x720 [ 222.362918] ? check_preemption_disabled+0x41/0x280 [ 222.367923] ? ioctl_preallocate+0x200/0x200 [ 222.372315] ? __fget+0x356/0x510 [ 222.375805] ? do_dup2+0x450/0x450 [ 222.379329] ? do_sys_open+0x2bf/0x520 [ 222.383220] ksys_ioctl+0x9b/0xc0 [ 222.386670] __x64_sys_ioctl+0x6f/0xb0 [ 222.390541] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 222.395124] do_syscall_64+0xf9/0x620 [ 222.398911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.404093] RIP: 0033:0x4658c7 [ 222.407276] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 222.426283] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 222.433975] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 222.441232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 222.448491] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 222.455743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 222.463055] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 222.476534] erofs: read_super, device -> /dev/loop2 [ 222.481577] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 222.528103] erofs: read_super, device -> /dev/loop4 [ 222.533318] erofs: options -> [ 222.542018] erofs: blksize 1 isn't supported on this platform [ 222.543103] erofs: read_super, device -> /dev/loop5 05:48:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 222.572519] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 222.595628] erofs: cannot find valid erofs superblock [ 222.596901] erofs: read_super, device -> /dev/loop3 [ 222.602091] erofs: read_super, device -> /dev/loop0 [ 222.606761] erofs: options -> acl,noacl, 05:48:34 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 222.632446] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 222.702070] erofs: read_super, device -> /dev/loop2 [ 222.706722] erofs: read_super, device -> /dev/loop1 [ 222.710627] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 222.724028] erofs: unmounted for /dev/loop3 [ 222.729176] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 222.729523] erofs: cannot find valid erofs superblock [ 222.752575] erofs: unmounted for /dev/loop0 [ 222.754234] erofs: cannot find valid erofs superblock [ 222.764326] erofs: read_super, device -> /dev/loop5 [ 222.773239] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 222.785368] erofs: cannot find valid erofs superblock 05:48:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 222.873033] FAULT_INJECTION: forcing a failure. [ 222.873033] name failslab, interval 1, probability 0, space 0, times 0 [ 222.911542] CPU: 1 PID: 15258 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 222.919461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.928815] Call Trace: [ 222.931441] dump_stack+0x1fc/0x2ef [ 222.935077] should_fail.cold+0xa/0xf [ 222.938871] ? setup_fault_attr+0x200/0x200 [ 222.943184] ? lock_acquire+0x170/0x3c0 [ 222.947164] __should_failslab+0x115/0x180 [ 222.951411] should_failslab+0x5/0x10 [ 222.955235] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 222.960347] __kmalloc_node_track_caller+0x38/0x70 [ 222.965269] __alloc_skb+0xae/0x560 [ 222.968886] alloc_uevent_skb+0x7b/0x210 [ 222.972934] kobject_uevent_env+0xa83/0x14a0 [ 222.977332] lo_ioctl+0xff9/0x20e0 [ 222.980857] ? loop_set_status64+0x110/0x110 [ 222.985252] blkdev_ioctl+0x5cb/0x1a80 [ 222.989124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.994498] ? blkpg_ioctl+0x9d0/0x9d0 [ 222.998373] ? mark_held_locks+0xf0/0xf0 [ 223.002420] ? mark_held_locks+0xf0/0xf0 [ 223.006545] ? debug_check_no_obj_freed+0x201/0x490 [ 223.011681] ? lock_downgrade+0x720/0x720 [ 223.015818] block_ioctl+0xe9/0x130 [ 223.019427] ? blkdev_fallocate+0x3f0/0x3f0 [ 223.023791] do_vfs_ioctl+0xcdb/0x12e0 [ 223.027668] ? lock_downgrade+0x720/0x720 [ 223.031802] ? check_preemption_disabled+0x41/0x280 [ 223.036923] ? ioctl_preallocate+0x200/0x200 [ 223.041332] ? __fget+0x356/0x510 [ 223.044773] ? do_dup2+0x450/0x450 [ 223.048306] ? do_sys_open+0x2bf/0x520 [ 223.052195] ksys_ioctl+0x9b/0xc0 [ 223.055663] __x64_sys_ioctl+0x6f/0xb0 [ 223.059549] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 223.064116] do_syscall_64+0xf9/0x620 [ 223.067917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.073103] RIP: 0033:0x4658c7 [ 223.076278] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 223.095163] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.102855] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 223.110168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 223.117434] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 223.124686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 223.131946] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 [ 223.142663] erofs: read_super, device -> /dev/loop3 [ 223.149779] erofs: options -> acl,noacl, [ 223.180211] erofs: read_super, device -> /dev/loop4 [ 223.185246] erofs: options -> [ 223.189384] erofs: blksize 1 isn't supported on this platform [ 223.218753] erofs: read_super, device -> /dev/loop0 05:48:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f8, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 223.229527] erofs: read_super, device -> /dev/loop1 [ 223.252694] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 223.253482] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 223.270728] erofs: unmounted for /dev/loop3 [ 223.278098] erofs: cannot find valid erofs superblock 05:48:35 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 223.344241] erofs: read_super, device -> /dev/loop2 [ 223.349669] erofs: read_super, device -> /dev/loop5 [ 223.354698] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 223.369307] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 223.376184] erofs: cannot find valid erofs superblock [ 223.381545] erofs: cannot find valid erofs superblock [ 223.519719] FAULT_INJECTION: forcing a failure. [ 223.519719] name failslab, interval 1, probability 0, space 0, times 0 [ 223.536675] CPU: 0 PID: 15292 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 223.544597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.553943] Call Trace: [ 223.556559] dump_stack+0x1fc/0x2ef [ 223.560181] should_fail.cold+0xa/0xf [ 223.563972] ? setup_fault_attr+0x200/0x200 [ 223.568293] ? lock_acquire+0x170/0x3c0 [ 223.572287] __should_failslab+0x115/0x180 [ 223.576529] should_failslab+0x5/0x10 [ 223.580337] kmem_cache_alloc_node+0x245/0x3b0 [ 223.584916] __alloc_skb+0x71/0x560 [ 223.588545] alloc_uevent_skb+0x7b/0x210 [ 223.592615] kobject_uevent_env+0xa83/0x14a0 [ 223.597043] lo_ioctl+0xff9/0x20e0 [ 223.600571] ? loop_set_status64+0x110/0x110 [ 223.604965] blkdev_ioctl+0x5cb/0x1a80 [ 223.608846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.614202] ? blkpg_ioctl+0x9d0/0x9d0 [ 223.618131] ? mark_held_locks+0xf0/0xf0 [ 223.622179] ? mark_held_locks+0xf0/0xf0 [ 223.626228] ? debug_check_no_obj_freed+0x201/0x490 [ 223.631247] ? lock_downgrade+0x720/0x720 [ 223.635390] block_ioctl+0xe9/0x130 [ 223.639001] ? blkdev_fallocate+0x3f0/0x3f0 [ 223.643376] do_vfs_ioctl+0xcdb/0x12e0 [ 223.647250] ? lock_downgrade+0x720/0x720 [ 223.651395] ? check_preemption_disabled+0x41/0x280 [ 223.656407] ? ioctl_preallocate+0x200/0x200 [ 223.660803] ? __fget+0x356/0x510 [ 223.664244] ? do_dup2+0x450/0x450 [ 223.667766] ? do_sys_open+0x2bf/0x520 [ 223.671654] ksys_ioctl+0x9b/0xc0 [ 223.675104] __x64_sys_ioctl+0x6f/0xb0 [ 223.678979] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 223.683553] do_syscall_64+0xf9/0x620 [ 223.687349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.692530] RIP: 0033:0x4658c7 [ 223.695726] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:48:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 223.714680] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.722385] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 223.729644] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 223.736908] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 223.744161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 223.751420] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 223.792860] erofs: read_super, device -> /dev/loop1 [ 223.797895] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 223.808578] erofs: read_super, device -> /dev/loop4 [ 223.814133] erofs: options -> [ 223.817784] erofs: read_super, device -> /dev/loop3 [ 223.822920] erofs: blksize 1 isn't supported on this platform [ 223.830667] erofs: options -> acl,noacl, [ 223.835939] erofs: cannot find valid erofs superblock [ 223.854542] erofs: read_super, device -> /dev/loop0 [ 223.856384] erofs: read_super, device -> /dev/loop5 [ 223.865682] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 223.882652] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:36 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 223.901120] erofs: cannot find valid erofs superblock 05:48:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f9, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 223.994321] erofs: unmounted for /dev/loop3 05:48:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 224.017121] erofs: read_super, device -> /dev/loop2 [ 224.024148] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 224.036488] FAULT_INJECTION: forcing a failure. [ 224.036488] name failslab, interval 1, probability 0, space 0, times 0 [ 224.048094] erofs: cannot find valid erofs superblock [ 224.059538] CPU: 0 PID: 15324 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 05:48:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 224.067449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.076797] Call Trace: [ 224.079392] dump_stack+0x1fc/0x2ef [ 224.083019] should_fail.cold+0xa/0xf [ 224.086806] ? setup_fault_attr+0x200/0x200 [ 224.091128] ? lock_acquire+0x170/0x3c0 [ 224.095100] __should_failslab+0x115/0x180 [ 224.099336] should_failslab+0x5/0x10 [ 224.103141] kmem_cache_alloc+0x277/0x370 [ 224.107292] skb_clone+0x151/0x3d0 [ 224.110847] netlink_broadcast_filtered+0x8df/0xbc0 [ 224.115882] netlink_broadcast+0x35/0x40 [ 224.119947] kobject_uevent_env+0xa49/0x14a0 [ 224.124361] lo_ioctl+0xff9/0x20e0 [ 224.127893] ? loop_set_status64+0x110/0x110 [ 224.132309] blkdev_ioctl+0x5cb/0x1a80 [ 224.136193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.141544] ? blkpg_ioctl+0x9d0/0x9d0 [ 224.145421] ? mark_held_locks+0xf0/0xf0 [ 224.149484] ? mark_held_locks+0xf0/0xf0 [ 224.153546] ? debug_check_no_obj_freed+0x201/0x490 [ 224.158559] ? lock_downgrade+0x720/0x720 [ 224.162699] block_ioctl+0xe9/0x130 [ 224.166314] ? blkdev_fallocate+0x3f0/0x3f0 [ 224.170636] do_vfs_ioctl+0xcdb/0x12e0 [ 224.174526] ? lock_downgrade+0x720/0x720 [ 224.178693] ? check_preemption_disabled+0x41/0x280 [ 224.183696] ? ioctl_preallocate+0x200/0x200 [ 224.188092] ? __fget+0x356/0x510 [ 224.191545] ? do_dup2+0x450/0x450 [ 224.195080] ? do_sys_open+0x2bf/0x520 [ 224.198968] ksys_ioctl+0x9b/0xc0 [ 224.202459] __x64_sys_ioctl+0x6f/0xb0 [ 224.206330] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 224.210906] do_syscall_64+0xf9/0x620 [ 224.214703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.219884] RIP: 0033:0x4658c7 [ 224.223071] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 224.241959] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 224.249659] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 224.256921] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 224.264176] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 224.271437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 224.278701] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 224.316804] erofs: read_super, device -> /dev/loop5 [ 224.322098] erofs: read_super, device -> /dev/loop4 [ 224.322932] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 224.327135] erofs: options -> [ 224.330362] erofs: blksize 1 isn't supported on this platform [ 224.343579] erofs: cannot find valid erofs superblock 05:48:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 224.466467] erofs: read_super, device -> /dev/loop1 [ 224.470422] erofs: read_super, device -> /dev/loop3 [ 224.476536] erofs: options -> acl,noacl, [ 224.480082] erofs: read_super, device -> /dev/loop0 [ 224.485618] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 224.503729] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:36 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 224.517791] erofs: read_super, device -> /dev/loop2 [ 224.536098] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 224.554316] erofs: cannot find valid erofs superblock [ 224.563068] erofs: cannot find valid erofs superblock 05:48:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 224.583661] erofs: unmounted for /dev/loop3 [ 224.661757] FAULT_INJECTION: forcing a failure. [ 224.661757] name failslab, interval 1, probability 0, space 0, times 0 [ 224.673149] CPU: 0 PID: 15359 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 224.681034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.690396] Call Trace: [ 224.693004] dump_stack+0x1fc/0x2ef [ 224.696637] should_fail.cold+0xa/0xf [ 224.700437] ? setup_fault_attr+0x200/0x200 [ 224.704768] ? lock_acquire+0x170/0x3c0 [ 224.708738] __should_failslab+0x115/0x180 [ 224.712974] should_failslab+0x5/0x10 [ 224.716782] kmem_cache_alloc+0x277/0x370 [ 224.720942] skb_clone+0x151/0x3d0 [ 224.724489] netlink_broadcast_filtered+0x8df/0xbc0 [ 224.729499] netlink_broadcast+0x35/0x40 [ 224.733549] kobject_uevent_env+0xa49/0x14a0 [ 224.737950] lo_ioctl+0xff9/0x20e0 [ 224.741492] ? loop_set_status64+0x110/0x110 [ 224.745899] blkdev_ioctl+0x5cb/0x1a80 [ 224.749774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.755123] ? blkpg_ioctl+0x9d0/0x9d0 [ 224.759110] ? mark_held_locks+0xf0/0xf0 [ 224.763165] ? mark_held_locks+0xf0/0xf0 [ 224.767220] ? debug_check_no_obj_freed+0x201/0x490 [ 224.772244] ? lock_downgrade+0x720/0x720 [ 224.776393] block_ioctl+0xe9/0x130 [ 224.780004] ? blkdev_fallocate+0x3f0/0x3f0 [ 224.784311] do_vfs_ioctl+0xcdb/0x12e0 [ 224.788185] ? lock_downgrade+0x720/0x720 [ 224.792328] ? check_preemption_disabled+0x41/0x280 [ 224.797342] ? ioctl_preallocate+0x200/0x200 [ 224.801752] ? __fget+0x356/0x510 [ 224.805201] ? do_dup2+0x450/0x450 [ 224.808730] ? do_sys_open+0x2bf/0x520 [ 224.812621] ksys_ioctl+0x9b/0xc0 [ 224.816072] __x64_sys_ioctl+0x6f/0xb0 [ 224.819946] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 224.824513] do_syscall_64+0xf9/0x620 [ 224.828298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.833471] RIP: 0033:0x4658c7 [ 224.836647] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 224.855638] RSP: 002b:00007ff81a69df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 224.863338] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 224.870595] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 224.877853] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 224.885108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 224.892374] R13: 0000000000000004 R14: 0000000020000070 R15: 0000000000000002 05:48:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 224.961038] erofs: read_super, device -> /dev/loop4 [ 224.966283] erofs: options -> [ 224.969801] erofs: read_super, device -> /dev/loop5 [ 225.006275] erofs: blksize 1 isn't supported on this platform [ 225.012541] erofs: read_super, device -> /dev/loop3 [ 225.013461] erofs: read_super, device -> /dev/loop0 [ 225.017716] erofs: options -> acl,noacl, [ 225.028740] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.034818] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.047905] erofs: read_super, device -> /dev/loop2 05:48:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 225.053327] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 225.060203] erofs: cannot find valid erofs superblock [ 225.060794] erofs: cannot find valid erofs superblock 05:48:37 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 225.191436] erofs: read_super, device -> /dev/loop1 [ 225.196508] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.214587] erofs: cannot find valid erofs superblock [ 225.220448] erofs: unmounted for /dev/loop3 05:48:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 225.244491] erofs: read_super, device -> /dev/loop0 [ 225.258158] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 225.370909] FAULT_INJECTION: forcing a failure. [ 225.370909] name failslab, interval 1, probability 0, space 0, times 0 [ 225.373831] erofs: read_super, device -> /dev/loop2 [ 225.397784] erofs: read_super, device -> /dev/loop5 [ 225.404010] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 225.408543] erofs: read_super, device -> /dev/loop3 [ 225.425029] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.451289] erofs: options -> acl,noacl, [ 225.454091] erofs: cannot find valid erofs superblock [ 225.460945] CPU: 1 PID: 15402 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 225.468854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.476243] erofs: read_super, device -> /dev/loop0 [ 225.478206] Call Trace: [ 225.478234] dump_stack+0x1fc/0x2ef [ 225.478254] should_fail.cold+0xa/0xf [ 225.478275] ? setup_fault_attr+0x200/0x200 [ 225.492377] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.493279] ? lock_acquire+0x170/0x3c0 [ 225.506682] erofs: cannot find valid erofs superblock [ 225.509693] __should_failslab+0x115/0x180 [ 225.509713] should_failslab+0x5/0x10 [ 225.509725] kmem_cache_alloc+0x277/0x370 [ 225.509744] getname_flags+0xce/0x590 [ 225.530846] do_mkdirat+0x8d/0x2d0 [ 225.534382] ? __ia32_sys_mknod+0x120/0x120 [ 225.538704] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 225.544078] ? trace_hardirqs_off_caller+0x6e/0x210 [ 225.549085] ? do_syscall_64+0x21/0x620 [ 225.553055] do_syscall_64+0xf9/0x620 [ 225.556855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.562029] RIP: 0033:0x464c17 [ 225.565215] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 225.584111] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 225.591806] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 225.599059] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 225.606311] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 225.613562] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 225.620818] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:38 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 225.790079] erofs: read_super, device -> /dev/loop1 [ 225.794717] erofs: unmounted for /dev/loop3 [ 225.805862] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 225.884360] erofs: cannot find valid erofs superblock [ 225.913953] FAULT_INJECTION: forcing a failure. [ 225.913953] name failslab, interval 1, probability 0, space 0, times 0 [ 225.926747] CPU: 0 PID: 15436 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 225.934641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.944100] Call Trace: [ 225.946702] dump_stack+0x1fc/0x2ef [ 225.950343] should_fail.cold+0xa/0xf [ 225.952823] erofs: read_super, device -> /dev/loop5 [ 225.954152] ? setup_fault_attr+0x200/0x200 [ 225.959175] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 225.963480] ? lock_acquire+0x170/0x3c0 [ 225.963500] __should_failslab+0x115/0x180 [ 225.963516] should_failslab+0x5/0x10 [ 225.963529] kmem_cache_alloc+0x277/0x370 [ 225.963546] __d_alloc+0x2b/0xa10 [ 225.963564] d_alloc+0x4a/0x230 [ 225.963582] __lookup_hash+0xc8/0x180 [ 225.963597] filename_create+0x186/0x490 [ 225.963611] ? kern_path_mountpoint+0x40/0x40 [ 225.963625] ? strncpy_from_user+0x2a2/0x350 [ 225.963642] ? getname_flags+0x25b/0x590 [ 225.977449] erofs: read_super, device -> /dev/loop0 [ 225.979962] do_mkdirat+0xa0/0x2d0 [ 225.979980] ? __ia32_sys_mknod+0x120/0x120 [ 225.979996] ? trace_hardirqs_off_caller+0x6e/0x210 [ 225.980013] ? do_syscall_64+0x21/0x620 [ 225.984123] erofs: read_super, device -> /dev/loop3 [ 225.987943] do_syscall_64+0xf9/0x620 [ 225.987963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.987974] RIP: 0033:0x464c17 05:48:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 225.987990] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 225.991723] erofs: read_super, device -> /dev/loop2 [ 225.994710] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 225.994725] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 225.994734] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 225.994742] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff 05:48:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 225.994750] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 225.994757] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 226.025200] erofs: options -> acl,noacl, [ 226.036910] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 226.043768] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 226.047696] erofs: cannot find valid erofs superblock [ 226.109099] erofs: blksize 1 isn't supported on this platform [ 226.169476] erofs: read_super, device -> /dev/loop1 05:48:38 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 226.198834] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 226.216132] erofs: unmounted for /dev/loop0 [ 226.221401] erofs: cannot find valid erofs superblock [ 226.228340] erofs: read_super, device -> /dev/loop2 [ 226.233605] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 226.250180] erofs: cannot find valid erofs superblock [ 226.259158] erofs: unmounted for /dev/loop3 [ 226.278591] FAULT_INJECTION: forcing a failure. [ 226.278591] name failslab, interval 1, probability 0, space 0, times 0 [ 226.290700] CPU: 0 PID: 15470 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 226.298587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.307963] Call Trace: [ 226.310558] dump_stack+0x1fc/0x2ef [ 226.314191] should_fail.cold+0xa/0xf [ 226.318015] ? setup_fault_attr+0x200/0x200 [ 226.322340] __should_failslab+0x115/0x180 [ 226.326567] should_failslab+0x5/0x10 [ 226.330361] kmem_cache_alloc+0x277/0x370 [ 226.334520] ? ext4_sync_fs+0x8d0/0x8d0 [ 226.338498] ext4_alloc_inode+0x1a/0x630 [ 226.342562] ? ext4_sync_fs+0x8d0/0x8d0 [ 226.346524] alloc_inode+0x5d/0x180 [ 226.350134] new_inode+0x1d/0xf0 [ 226.353500] __ext4_new_inode+0x400/0x5a20 [ 226.357743] ? putname+0xe1/0x120 [ 226.361191] ? do_mkdirat+0xa0/0x2d0 [ 226.364910] ? ext4_free_inode+0x1780/0x1780 [ 226.369324] ? debug_check_no_obj_freed+0x201/0x490 [ 226.374353] ? __dquot_initialize+0x298/0xb70 [ 226.378860] ? lock_acquire+0x170/0x3c0 [ 226.382830] ? dquot_initialize_needed+0x290/0x290 [ 226.387749] ? trace_hardirqs_off+0x64/0x200 [ 226.392145] ? common_perm+0x4be/0x800 [ 226.396033] ext4_mkdir+0x396/0xe10 [ 226.399664] ? putname+0xe1/0x120 [ 226.403105] ? ext4_init_dot_dotdot+0x600/0x600 [ 226.407762] ? generic_permission+0x116/0x4d0 [ 226.412241] ? security_inode_permission+0xc5/0xf0 [ 226.417169] ? inode_permission.part.0+0x10c/0x450 [ 226.422109] vfs_mkdir+0x508/0x7a0 [ 226.425646] do_mkdirat+0x262/0x2d0 [ 226.429257] ? __ia32_sys_mknod+0x120/0x120 [ 226.433576] ? trace_hardirqs_off_caller+0x6e/0x210 [ 226.438596] ? do_syscall_64+0x21/0x620 [ 226.442570] do_syscall_64+0xf9/0x620 [ 226.446381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.451562] RIP: 0033:0x464c17 [ 226.454749] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 226.473656] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 226.481372] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 226.488630] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 226.495893] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 226.503164] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 226.510427] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 226.679447] erofs: read_super, device -> /dev/loop0 05:48:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:39 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 226.718394] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 226.791409] erofs: read_super, device -> /dev/loop1 05:48:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 226.820415] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 226.844531] FAULT_INJECTION: forcing a failure. [ 226.844531] name failslab, interval 1, probability 0, space 0, times 0 [ 226.864674] erofs: read_super, device -> /dev/loop2 [ 226.880904] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 226.889360] erofs: read_super, device -> /dev/loop3 [ 226.898345] CPU: 1 PID: 15497 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 226.906252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.907447] erofs: cannot find valid erofs superblock [ 226.915607] Call Trace: [ 226.915640] dump_stack+0x1fc/0x2ef [ 226.915660] should_fail.cold+0xa/0xf [ 226.915678] ? setup_fault_attr+0x200/0x200 [ 226.915701] __should_failslab+0x115/0x180 [ 226.915717] should_failslab+0x5/0x10 [ 226.915736] kmem_cache_alloc+0x277/0x370 [ 226.921738] erofs: options -> acl,noacl, [ 226.923494] ? ext4_sync_fs+0x8d0/0x8d0 [ 226.923512] ext4_alloc_inode+0x1a/0x630 [ 226.923528] ? ext4_sync_fs+0x8d0/0x8d0 [ 226.923541] alloc_inode+0x5d/0x180 [ 226.923555] new_inode+0x1d/0xf0 [ 226.940217] erofs: cannot find valid erofs superblock [ 226.943295] __ext4_new_inode+0x400/0x5a20 [ 226.943318] ? putname+0xe1/0x120 [ 226.943329] ? do_mkdirat+0xa0/0x2d0 [ 226.943350] ? ext4_free_inode+0x1780/0x1780 [ 226.991359] ? debug_check_no_obj_freed+0x201/0x490 [ 226.996362] ? __dquot_initialize+0x298/0xb70 [ 227.000842] ? lock_acquire+0x170/0x3c0 [ 227.004798] ? dquot_initialize_needed+0x290/0x290 [ 227.009712] ? trace_hardirqs_off+0x64/0x200 [ 227.014106] ? common_perm+0x4be/0x800 [ 227.017973] ext4_mkdir+0x396/0xe10 [ 227.021601] ? putname+0xe1/0x120 [ 227.025064] ? ext4_init_dot_dotdot+0x600/0x600 [ 227.029762] ? generic_permission+0x116/0x4d0 [ 227.034237] ? security_inode_permission+0xc5/0xf0 [ 227.039149] ? inode_permission.part.0+0x10c/0x450 [ 227.044060] vfs_mkdir+0x508/0x7a0 [ 227.047650] do_mkdirat+0x262/0x2d0 [ 227.051262] ? __ia32_sys_mknod+0x120/0x120 [ 227.055686] ? trace_hardirqs_off_caller+0x6e/0x210 [ 227.060699] ? do_syscall_64+0x21/0x620 [ 227.064657] do_syscall_64+0xf9/0x620 [ 227.068442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.073614] RIP: 0033:0x464c17 [ 227.076799] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 227.095830] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 227.103634] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 227.110892] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 227.118155] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff 05:48:39 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 227.125412] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 227.132665] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 227.188121] erofs: read_super, device -> /dev/loop0 [ 227.193171] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 227.226069] erofs: read_super, device -> /dev/loop5 [ 227.231530] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 227.265925] erofs: blksize 1 isn't supported on this platform [ 227.284594] erofs: unmounted for /dev/loop3 05:48:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 227.390934] FAULT_INJECTION: forcing a failure. [ 227.390934] name failslab, interval 1, probability 0, space 0, times 0 [ 227.402657] CPU: 1 PID: 15515 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 227.410550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.419914] Call Trace: [ 227.422513] dump_stack+0x1fc/0x2ef [ 227.426146] should_fail.cold+0xa/0xf [ 227.429949] ? setup_fault_attr+0x200/0x200 [ 227.434262] ? __es_tree_search.isra.0+0x1af/0x210 [ 227.439182] __should_failslab+0x115/0x180 [ 227.443411] should_failslab+0x5/0x10 [ 227.447205] kmem_cache_alloc+0x3f/0x370 [ 227.451259] __es_insert_extent+0x39b/0x13b0 [ 227.455666] ? lock_acquire+0x170/0x3c0 [ 227.459652] ? ext4_es_insert_extent+0x17e/0x5e0 [ 227.464416] ext4_es_insert_extent+0x22e/0x5e0 [ 227.469006] ? lock_downgrade+0x720/0x720 [ 227.473152] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 227.478940] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 227.483945] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 227.489727] ext4_ext_map_blocks+0x2129/0x7390 [ 227.494363] ? __lock_acquire+0x6de/0x3ff0 [ 227.498585] ? __lock_acquire+0x6de/0x3ff0 [ 227.503242] ? mark_held_locks+0xf0/0xf0 [ 227.507391] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 227.512738] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 227.517911] ? mark_held_locks+0xf0/0xf0 [ 227.521955] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 227.526780] ? ext4_es_lookup_extent+0x375/0xb60 [ 227.531522] ? check_preemption_disabled+0x41/0x280 [ 227.536525] ? lock_acquire+0x170/0x3c0 [ 227.541267] ? ext4_map_blocks+0x33e/0x1a50 [ 227.545577] ext4_map_blocks+0xd88/0x1a50 [ 227.549774] ? check_preemption_disabled+0x41/0x280 [ 227.554863] ? ext4_issue_zeroout+0x160/0x160 [ 227.559341] ? __brelse+0x84/0xa0 [ 227.562776] ? __ext4_new_inode+0x2eb/0x5a20 [ 227.567193] ext4_getblk+0xad/0x4f0 [ 227.570821] ? ext4_iomap_begin+0xe00/0xe00 [ 227.575132] ? ext4_free_inode+0x1780/0x1780 [ 227.579538] ? debug_check_no_obj_freed+0x201/0x490 [ 227.584539] ? __dquot_initialize+0x298/0xb70 [ 227.589021] ext4_bread+0x7c/0x210 [ 227.592546] ? ext4_getblk+0x4f0/0x4f0 [ 227.596420] ? dquot_initialize_needed+0x290/0x290 [ 227.601637] ? trace_hardirqs_off+0x64/0x200 [ 227.606033] ext4_append+0x155/0x370 [ 227.609778] ext4_mkdir+0x5bd/0xe10 [ 227.613392] ? ext4_init_dot_dotdot+0x600/0x600 [ 227.618051] ? generic_permission+0x116/0x4d0 [ 227.622531] ? inode_permission.part.0+0x10c/0x450 [ 227.627451] vfs_mkdir+0x508/0x7a0 [ 227.630976] do_mkdirat+0x262/0x2d0 [ 227.634588] ? __ia32_sys_mknod+0x120/0x120 [ 227.638894] ? trace_hardirqs_off_caller+0x6e/0x210 [ 227.643901] ? do_syscall_64+0x21/0x620 [ 227.647861] do_syscall_64+0xf9/0x620 [ 227.651649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.656820] RIP: 0033:0x464c17 [ 227.659994] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 227.678894] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 227.686628] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 227.693909] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 227.701172] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 227.708448] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 227.715725] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 227.779806] erofs: read_super, device -> /dev/loop4 [ 227.779833] erofs: read_super, device -> /dev/loop1 [ 227.784851] erofs: options -> [ 227.797228] erofs: read_super, device -> /dev/loop3 [ 227.802341] erofs: blksize 1 isn't supported on this platform [ 227.802365] erofs: options -> acl,noacl, [ 227.821953] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 227.833873] erofs: read_super, device -> /dev/loop2 [ 227.839200] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 227.854209] erofs: read_super, device -> /dev/loop5 [ 227.860420] erofs: read_super, device -> /dev/loop0 [ 227.868573] erofs: cannot find valid erofs superblock [ 227.870060] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:40 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 227.883825] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 227.892840] erofs: unmounted for /dev/loop3 [ 227.900150] erofs: blksize 1 isn't supported on this platform [ 227.912660] erofs: blksize 1 isn't supported on this platform [ 228.101355] FAULT_INJECTION: forcing a failure. [ 228.101355] name failslab, interval 1, probability 0, space 0, times 0 [ 228.122947] CPU: 1 PID: 15552 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 228.130873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.140225] Call Trace: [ 228.142815] dump_stack+0x1fc/0x2ef [ 228.146439] should_fail.cold+0xa/0xf [ 228.150230] ? setup_fault_attr+0x200/0x200 [ 228.154547] __should_failslab+0x115/0x180 [ 228.158772] should_failslab+0x5/0x10 [ 228.162581] kmem_cache_alloc+0x277/0x370 [ 228.166732] ? ext4_sync_fs+0x8d0/0x8d0 [ 228.170707] ext4_alloc_inode+0x1a/0x630 [ 228.174763] ? ext4_sync_fs+0x8d0/0x8d0 [ 228.178727] alloc_inode+0x5d/0x180 [ 228.182341] new_inode+0x1d/0xf0 [ 228.185696] __ext4_new_inode+0x400/0x5a20 [ 228.189925] ? putname+0xe1/0x120 [ 228.193361] ? do_mkdirat+0xa0/0x2d0 [ 228.197078] ? ext4_free_inode+0x1780/0x1780 [ 228.201472] ? debug_check_no_obj_freed+0x201/0x490 [ 228.206475] ? __dquot_initialize+0x298/0xb70 [ 228.210963] ? lock_acquire+0x170/0x3c0 [ 228.214924] ? dquot_initialize_needed+0x290/0x290 [ 228.219841] ? trace_hardirqs_off+0x64/0x200 [ 228.224237] ? common_perm+0x4be/0x800 [ 228.228114] ext4_mkdir+0x396/0xe10 [ 228.231729] ? putname+0xe1/0x120 [ 228.235171] ? ext4_init_dot_dotdot+0x600/0x600 [ 228.239828] ? generic_permission+0x116/0x4d0 [ 228.244306] ? security_inode_permission+0xc5/0xf0 [ 228.249223] ? inode_permission.part.0+0x10c/0x450 [ 228.254140] vfs_mkdir+0x508/0x7a0 [ 228.257667] do_mkdirat+0x262/0x2d0 [ 228.261279] ? __ia32_sys_mknod+0x120/0x120 [ 228.265589] ? trace_hardirqs_off_caller+0x6e/0x210 [ 228.270590] ? do_syscall_64+0x21/0x620 [ 228.274553] do_syscall_64+0xf9/0x620 [ 228.278343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.283518] RIP: 0033:0x464c17 [ 228.286704] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 228.305588] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 228.313280] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 228.320531] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 228.327785] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 228.335037] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 228.342289] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 228.468297] erofs: read_super, device -> /dev/loop3 [ 228.501651] erofs: options -> acl,noacl, [ 228.509128] erofs: read_super, device -> /dev/loop2 [ 228.523516] erofs: read_super, device -> /dev/loop1 [ 228.527775] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 228.550382] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 228.551602] erofs: read_super, device -> /dev/loop0 [ 228.580570] erofs: blksize 1 isn't supported on this platform [ 228.589709] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 228.604826] erofs: unmounted for /dev/loop3 [ 228.609334] erofs: unmounted for /dev/loop1 05:48:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 228.856285] erofs: read_super, device -> /dev/loop3 [ 228.868700] erofs: read_super, device -> /dev/loop5 [ 228.873758] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 228.894033] erofs: options -> acl,noacl, 05:48:41 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf803, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 228.908136] erofs: blksize 1 isn't supported on this platform [ 228.932943] erofs: read_super, device -> /dev/loop2 [ 228.944897] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 228.960870] erofs: blksize 1 isn't supported on this platform [ 228.962215] erofs: unmounted for /dev/loop3 [ 228.975261] erofs: read_super, device -> /dev/loop1 [ 228.985170] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 228.995302] erofs: cannot find valid erofs superblock [ 229.039986] FAULT_INJECTION: forcing a failure. [ 229.039986] name failslab, interval 1, probability 0, space 0, times 0 [ 229.046868] erofs: read_super, device -> /dev/loop0 [ 229.051316] CPU: 1 PID: 15602 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 229.064197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.066378] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 229.073551] Call Trace: [ 229.073578] dump_stack+0x1fc/0x2ef [ 229.073595] should_fail.cold+0xa/0xf [ 229.073611] ? setup_fault_attr+0x200/0x200 [ 229.073626] ? __es_tree_search.isra.0+0x1af/0x210 [ 229.073645] __should_failslab+0x115/0x180 [ 229.073663] should_failslab+0x5/0x10 [ 229.109015] kmem_cache_alloc+0x3f/0x370 [ 229.113090] __es_insert_extent+0x39b/0x13b0 [ 229.117501] ? lock_acquire+0x170/0x3c0 [ 229.121477] ? ext4_es_insert_extent+0x17e/0x5e0 [ 229.126232] ext4_es_insert_extent+0x22e/0x5e0 [ 229.130808] ? lock_downgrade+0x720/0x720 [ 229.134950] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 229.140744] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 229.145744] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 229.151658] ext4_ext_map_blocks+0x2129/0x7390 [ 229.156298] ? __lock_acquire+0x6de/0x3ff0 [ 229.160521] ? __lock_acquire+0x6de/0x3ff0 [ 229.164756] ? mark_held_locks+0xf0/0xf0 [ 229.168810] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 229.174275] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 229.179452] ? mark_held_locks+0xf0/0xf0 [ 229.183562] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 229.188392] ? ext4_es_lookup_extent+0x375/0xb60 [ 229.193137] ? check_preemption_disabled+0x41/0x280 [ 229.198153] ? lock_acquire+0x170/0x3c0 [ 229.202171] ? ext4_map_blocks+0x33e/0x1a50 [ 229.206483] ext4_map_blocks+0xd88/0x1a50 [ 229.210616] ? check_preemption_disabled+0x41/0x280 [ 229.215616] ? ext4_issue_zeroout+0x160/0x160 [ 229.220096] ? __brelse+0x84/0xa0 [ 229.223534] ? __ext4_new_inode+0x2eb/0x5a20 [ 229.227929] ext4_getblk+0xad/0x4f0 [ 229.231550] ? ext4_iomap_begin+0xe00/0xe00 [ 229.235866] ? ext4_free_inode+0x1780/0x1780 [ 229.240271] ? debug_check_no_obj_freed+0x201/0x490 [ 229.245277] ? __dquot_initialize+0x298/0xb70 [ 229.249762] ext4_bread+0x7c/0x210 [ 229.253286] ? ext4_getblk+0x4f0/0x4f0 [ 229.257158] ? dquot_initialize_needed+0x290/0x290 [ 229.262072] ? trace_hardirqs_off+0x64/0x200 [ 229.266469] ext4_append+0x155/0x370 [ 229.270179] ext4_mkdir+0x5bd/0xe10 [ 229.273801] ? ext4_init_dot_dotdot+0x600/0x600 [ 229.278465] ? generic_permission+0x116/0x4d0 [ 229.282971] ? inode_permission.part.0+0x10c/0x450 [ 229.287908] vfs_mkdir+0x508/0x7a0 [ 229.291436] do_mkdirat+0x262/0x2d0 [ 229.295046] ? __ia32_sys_mknod+0x120/0x120 [ 229.299353] ? trace_hardirqs_off_caller+0x6e/0x210 [ 229.304351] ? do_syscall_64+0x21/0x620 [ 229.308308] do_syscall_64+0xf9/0x620 [ 229.312095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.317268] RIP: 0033:0x464c17 [ 229.320447] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 229.339338] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 229.347051] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 229.354313] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 229.361567] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 229.368821] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 229.376074] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 229.439864] erofs: read_super, device -> /dev/loop4 [ 229.479303] erofs: read_super, device -> /dev/loop5 [ 229.488159] erofs: options -> [ 229.495820] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 229.516796] erofs: blksize 1 isn't supported on this platform [ 229.521242] erofs: read_super, device -> /dev/loop3 05:48:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 229.528160] erofs: options -> acl,noacl, 05:48:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf903, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 229.550750] erofs: blksize 1 isn't supported on this platform [ 229.567839] erofs: unmounted for /dev/loop3 [ 229.587260] erofs: read_super, device -> /dev/loop2 [ 229.592624] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:41 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 229.600326] erofs: blksize 1 isn't supported on this platform 05:48:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 229.645947] erofs: read_super, device -> /dev/loop1 [ 229.652974] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 229.674079] erofs: cannot find valid erofs superblock [ 229.691734] erofs: read_super, device -> /dev/loop0 [ 229.696852] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 229.732469] FAULT_INJECTION: forcing a failure. [ 229.732469] name failslab, interval 1, probability 0, space 0, times 0 [ 229.744288] CPU: 0 PID: 15641 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 229.752173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.761531] Call Trace: [ 229.764122] dump_stack+0x1fc/0x2ef [ 229.767741] should_fail.cold+0xa/0xf [ 229.771544] ? setup_fault_attr+0x200/0x200 [ 229.775862] ? lock_downgrade+0x720/0x720 [ 229.780008] ? check_preemption_disabled+0x41/0x280 [ 229.785023] __should_failslab+0x115/0x180 [ 229.789256] should_failslab+0x5/0x10 [ 229.793048] kmem_cache_alloc+0x277/0x370 [ 229.797182] ext4_mb_new_blocks+0x60a/0x4370 [ 229.801582] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 229.806590] ? ext4_cache_extents+0x68/0x2d0 [ 229.811001] ? ext4_find_extent+0x9bb/0xc70 [ 229.815323] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 229.820607] ? ext4_ext_search_right+0x2c7/0xb60 [ 229.825365] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 229.830384] ext4_ext_map_blocks+0x2aa2/0x7390 [ 229.835071] ? __lock_acquire+0x6de/0x3ff0 [ 229.839322] ? mark_held_locks+0xf0/0xf0 [ 229.843380] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 229.848745] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 229.853941] ? mark_held_locks+0xf0/0xf0 [ 229.858016] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 229.862855] ? ext4_es_lookup_extent+0x375/0xb60 [ 229.867611] ? ext4_map_blocks+0x59f/0x1a50 [ 229.871959] ext4_map_blocks+0x7a2/0x1a50 [ 229.876109] ? check_preemption_disabled+0x41/0x280 [ 229.881128] ? ext4_issue_zeroout+0x160/0x160 [ 229.885618] ? __brelse+0x84/0xa0 [ 229.889068] ? __ext4_new_inode+0x2eb/0x5a20 [ 229.893493] ext4_getblk+0xad/0x4f0 [ 229.897118] ? ext4_iomap_begin+0xe00/0xe00 [ 229.901442] ? ext4_free_inode+0x1780/0x1780 [ 229.905862] ? debug_check_no_obj_freed+0x201/0x490 [ 229.910886] ? __dquot_initialize+0x298/0xb70 [ 229.915377] ext4_bread+0x7c/0x210 [ 229.918911] ? ext4_getblk+0x4f0/0x4f0 [ 229.922793] ? dquot_initialize_needed+0x290/0x290 [ 229.927716] ? trace_hardirqs_off+0x64/0x200 [ 229.932127] ext4_append+0x155/0x370 [ 229.935926] ext4_mkdir+0x5bd/0xe10 [ 229.939557] ? ext4_init_dot_dotdot+0x600/0x600 [ 229.944226] ? generic_permission+0x116/0x4d0 [ 229.948722] ? inode_permission.part.0+0x10c/0x450 [ 229.953654] vfs_mkdir+0x508/0x7a0 [ 229.957181] do_mkdirat+0x262/0x2d0 [ 229.960815] ? __ia32_sys_mknod+0x120/0x120 [ 229.965147] ? trace_hardirqs_off_caller+0x6e/0x210 [ 229.970168] ? do_syscall_64+0x21/0x620 [ 229.974139] do_syscall_64+0xf9/0x620 [ 229.977928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.983109] RIP: 0033:0x464c17 [ 229.986306] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 230.005215] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 230.012938] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 230.020219] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 230.027493] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 230.034763] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 230.042090] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 230.140360] erofs: read_super, device -> /dev/loop3 05:48:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:42 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 230.162046] erofs: options -> acl,noacl, 05:48:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 230.201401] erofs: read_super, device -> /dev/loop2 [ 230.221325] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 230.235961] erofs: read_super, device -> /dev/loop0 [ 230.246939] erofs: blksize 1 isn't supported on this platform [ 230.249069] erofs: unmounted for /dev/loop3 [ 230.256991] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 230.267698] FAULT_INJECTION: forcing a failure. [ 230.267698] name failslab, interval 1, probability 0, space 0, times 0 [ 230.279279] CPU: 0 PID: 15668 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 230.287181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.296541] Call Trace: 05:48:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 230.299160] dump_stack+0x1fc/0x2ef [ 230.302803] should_fail.cold+0xa/0xf [ 230.306622] ? setup_fault_attr+0x200/0x200 [ 230.310954] ? __es_tree_search.isra.0+0x1af/0x210 [ 230.315897] __should_failslab+0x115/0x180 [ 230.320149] should_failslab+0x5/0x10 [ 230.323957] kmem_cache_alloc+0x3f/0x370 [ 230.328025] __es_insert_extent+0x39b/0x13b0 [ 230.332441] ext4_es_insert_extent+0x22e/0x5e0 [ 230.337009] ? ext4_map_blocks+0x59f/0x1a50 [ 230.341330] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 230.347132] ext4_map_blocks+0xa2a/0x1a50 [ 230.351281] ? ext4_issue_zeroout+0x160/0x160 [ 230.355874] ? __brelse+0x84/0xa0 [ 230.359310] ? __ext4_new_inode+0x2eb/0x5a20 [ 230.363727] ext4_getblk+0xad/0x4f0 [ 230.367349] ? ext4_iomap_begin+0xe00/0xe00 [ 230.371655] ? ext4_free_inode+0x1780/0x1780 [ 230.376051] ? debug_check_no_obj_freed+0x201/0x490 [ 230.381064] ? __dquot_initialize+0x298/0xb70 [ 230.385555] ext4_bread+0x7c/0x210 [ 230.389083] ? ext4_getblk+0x4f0/0x4f0 [ 230.392955] ? dquot_initialize_needed+0x290/0x290 [ 230.397921] ? trace_hardirqs_off+0x64/0x200 [ 230.402332] ext4_append+0x155/0x370 [ 230.406041] ext4_mkdir+0x5bd/0xe10 [ 230.409656] ? ext4_init_dot_dotdot+0x600/0x600 [ 230.414369] ? generic_permission+0x116/0x4d0 [ 230.418851] ? inode_permission.part.0+0x10c/0x450 [ 230.423782] vfs_mkdir+0x508/0x7a0 [ 230.427317] do_mkdirat+0x262/0x2d0 [ 230.430941] ? __ia32_sys_mknod+0x120/0x120 [ 230.435258] ? trace_hardirqs_off_caller+0x6e/0x210 [ 230.440267] ? do_syscall_64+0x21/0x620 [ 230.444246] do_syscall_64+0xf9/0x620 [ 230.448051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.453224] RIP: 0033:0x464c17 [ 230.456413] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 230.475326] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 230.483046] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 230.490323] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 230.497585] RBP: 00007ff81a69e040 R08: 0000000000000000 R09: ffffffffffffffff [ 230.504847] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 230.512117] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 230.561447] erofs: read_super, device -> /dev/loop5 [ 230.564630] erofs: read_super, device -> /dev/loop4 [ 230.572245] erofs: read_super, device -> /dev/loop1 [ 230.587457] erofs: options -> [ 230.589617] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 230.598131] erofs: blksize 1 isn't supported on this platform 05:48:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 230.610940] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 230.619157] erofs: blksize 1 isn't supported on this platform [ 230.636595] erofs: cannot find valid erofs superblock 05:48:42 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 230.698057] erofs: read_super, device -> /dev/loop2 [ 230.704041] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 230.712211] erofs: blksize 1 isn't supported on this platform [ 230.735995] erofs: read_super, device -> /dev/loop3 [ 230.743382] erofs: options -> acl,noacl, 05:48:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 230.790966] erofs: read_super, device -> /dev/loop0 [ 230.796017] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 230.811981] erofs: read_super, device -> /dev/loop1 [ 230.830013] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 230.845830] FAULT_INJECTION: forcing a failure. [ 230.845830] name failslab, interval 1, probability 0, space 0, times 0 [ 230.861736] erofs: unmounted for /dev/loop3 [ 230.871272] CPU: 1 PID: 15702 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 230.879189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.888555] Call Trace: [ 230.891146] dump_stack+0x1fc/0x2ef [ 230.894765] should_fail.cold+0xa/0xf [ 230.898558] ? setup_fault_attr+0x200/0x200 [ 230.902866] ? lock_acquire+0x170/0x3c0 [ 230.906832] __should_failslab+0x115/0x180 [ 230.911060] should_failslab+0x5/0x10 [ 230.914846] __kmalloc_track_caller+0x2a6/0x3c0 [ 230.919503] ? strndup_user+0x70/0x120 [ 230.923377] ? _copy_from_user+0xd2/0x130 [ 230.927523] memdup_user+0x22/0xb0 [ 230.931051] strndup_user+0x70/0x120 [ 230.934751] ksys_mount+0x6f/0x130 [ 230.938279] __x64_sys_mount+0xba/0x150 [ 230.942240] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 230.946813] do_syscall_64+0xf9/0x620 [ 230.950604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.955777] RIP: 0033:0x46702a [ 230.958957] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 230.977955] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 230.985654] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 230.992907] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 231.000180] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 231.007442] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 231.014703] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 231.074598] erofs: unmounted for /dev/loop1 05:48:43 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 231.097403] erofs: read_super, device -> /dev/loop2 [ 231.102721] erofs: read_super, device -> /dev/loop5 [ 231.102731] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.116298] erofs: root inode @ nid 0 [ 231.159122] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, 05:48:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 231.303677] FAULT_INJECTION: forcing a failure. [ 231.303677] name failslab, interval 1, probability 0, space 0, times 0 [ 231.311971] erofs: read_super, device -> /dev/loop5 [ 231.315140] erofs: read_super, device -> /dev/loop3 [ 231.320523] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.325457] erofs: read_super, device -> /dev/loop1 [ 231.339707] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.346661] CPU: 0 PID: 15733 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 231.351099] erofs: options -> acl,noacl, [ 231.355735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.355742] Call Trace: [ 231.355767] dump_stack+0x1fc/0x2ef [ 231.355787] should_fail.cold+0xa/0xf [ 231.355805] ? setup_fault_attr+0x200/0x200 [ 231.355822] ? lock_acquire+0x170/0x3c0 [ 231.355843] __should_failslab+0x115/0x180 [ 231.355864] should_failslab+0x5/0x10 [ 231.362536] erofs: read_super, device -> /dev/loop0 [ 231.369265] __kmalloc_track_caller+0x2a6/0x3c0 [ 231.369283] ? strndup_user+0x70/0x120 [ 231.369296] ? _copy_from_user+0xd2/0x130 [ 231.369311] memdup_user+0x22/0xb0 [ 231.369327] strndup_user+0x70/0x120 [ 231.373631] erofs: read_super, device -> /dev/loop2 [ 231.375516] ksys_mount+0x6f/0x130 [ 231.379886] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 231.383605] __x64_sys_mount+0xba/0x150 [ 231.383625] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 231.383641] do_syscall_64+0xf9/0x620 [ 231.383659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.383669] RIP: 0033:0x46702a [ 231.383683] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.383690] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 231.383702] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 231.383710] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 231.383718] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 231.383731] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 231.388195] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.391921] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 231.423140] erofs: root inode @ nid 0 [ 231.432130] erofs: cannot find valid erofs superblock 05:48:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:48:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 231.557168] print_req_error: I/O error, dev loop4, sector 0 05:48:43 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 231.780331] erofs: unmounted for /dev/loop3 [ 231.817478] erofs: read_super, device -> /dev/loop1 [ 231.833819] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.854591] FAULT_INJECTION: forcing a failure. [ 231.854591] name failslab, interval 1, probability 0, space 0, times 0 [ 231.857155] erofs: cannot find valid erofs superblock [ 231.866237] CPU: 1 PID: 15766 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 231.879097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.888458] Call Trace: [ 231.891064] dump_stack+0x1fc/0x2ef [ 231.894704] should_fail.cold+0xa/0xf [ 231.898515] ? setup_fault_attr+0x200/0x200 [ 231.900598] erofs: read_super, device -> /dev/loop5 [ 231.902847] ? lock_acquire+0x170/0x3c0 [ 231.902867] __should_failslab+0x115/0x180 [ 231.902885] should_failslab+0x5/0x10 [ 231.908299] erofs: read_super, device -> /dev/loop2 [ 231.911852] __kmalloc_track_caller+0x2a6/0x3c0 [ 231.911866] ? strndup_user+0x70/0x120 [ 231.911883] ? _copy_from_user+0xd2/0x130 [ 231.922692] erofs: read_super, device -> /dev/loop0 [ 231.924895] memdup_user+0x22/0xb0 [ 231.929543] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.933424] strndup_user+0x70/0x120 [ 231.933439] ksys_mount+0x6f/0x130 [ 231.933456] __x64_sys_mount+0xba/0x150 [ 231.933472] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 231.933489] do_syscall_64+0xf9/0x620 [ 231.965163] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 231.965471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.965485] RIP: 0033:0x46702a [ 231.965499] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.965510] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 231.971426] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 231.973865] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 231.973875] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 231.973884] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 231.973893] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 231.973901] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 231.977351] erofs: cannot find valid erofs superblock [ 231.997021] erofs: root inode @ nid 0 [ 232.084108] erofs: read_super, device -> /dev/loop3 05:48:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 232.111032] erofs: options -> acl,noacl, 05:48:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:44 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 232.316926] erofs: read_super, device -> /dev/loop5 [ 232.322187] erofs: unmounted for /dev/loop3 [ 232.328907] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 232.340474] erofs: read_super, device -> /dev/loop2 [ 232.346901] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 232.358190] erofs: cannot find valid erofs superblock [ 232.365219] erofs: cannot find valid erofs superblock [ 232.390766] FAULT_INJECTION: forcing a failure. [ 232.390766] name failslab, interval 1, probability 0, space 0, times 0 [ 232.402769] CPU: 1 PID: 15798 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 232.405410] erofs: read_super, device -> /dev/loop0 [ 232.410671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.425027] Call Trace: [ 232.427636] dump_stack+0x1fc/0x2ef [ 232.431285] should_fail.cold+0xa/0xf [ 232.435100] ? setup_fault_attr+0x200/0x200 05:48:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 232.439431] ? lock_acquire+0x170/0x3c0 [ 232.443432] __should_failslab+0x115/0x180 [ 232.447712] should_failslab+0x5/0x10 [ 232.451524] kmem_cache_alloc+0x277/0x370 [ 232.455682] getname_flags+0xce/0x590 [ 232.459501] user_path_at_empty+0x2a/0x50 [ 232.463664] do_mount+0x147/0x2f10 [ 232.465050] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 232.467211] ? cmp_ex_sort+0xc0/0xc0 [ 232.467232] ? __do_page_fault+0x180/0xd60 [ 232.467247] ? copy_mount_string+0x40/0x40 [ 232.467268] ? memset+0x20/0x40 05:48:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 232.488119] erofs: cannot find valid erofs superblock [ 232.490819] ? copy_mount_options+0x26f/0x380 [ 232.490840] ksys_mount+0xcf/0x130 [ 232.490856] __x64_sys_mount+0xba/0x150 [ 232.490874] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 232.490889] do_syscall_64+0xf9/0x620 [ 232.490905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.490916] RIP: 0033:0x46702a [ 232.490931] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.490938] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 232.490951] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 232.490960] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 232.490968] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 232.490976] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 232.490984] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:44 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 232.611078] erofs: read_super, device -> /dev/loop1 [ 232.617125] erofs: read_super, device -> /dev/loop3 [ 232.630006] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 232.638984] erofs: options -> acl,noacl, [ 232.647750] erofs: cannot find valid erofs superblock [ 232.728648] erofs: read_super, device -> /dev/loop2 [ 232.736818] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 232.750232] erofs: cannot find valid erofs superblock [ 232.750681] erofs: read_super, device -> /dev/loop5 [ 232.766905] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 232.779983] erofs: cannot find valid erofs superblock [ 232.799058] FAULT_INJECTION: forcing a failure. [ 232.799058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 232.810901] CPU: 0 PID: 15828 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 232.818793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:48:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 232.828158] Call Trace: [ 232.830764] dump_stack+0x1fc/0x2ef [ 232.834406] should_fail.cold+0xa/0xf [ 232.838218] ? setup_fault_attr+0x200/0x200 [ 232.842553] ? crypto_shash_update+0xcc/0x120 [ 232.847068] __alloc_pages_nodemask+0x239/0x2890 [ 232.851845] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 232.857749] ? cmp_ex_search+0x87/0xb0 [ 232.861649] ? __lock_acquire+0x6de/0x3ff0 [ 232.865977] ? copy_mount_options+0x1e9/0x380 [ 232.870488] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 232.875341] ? ex_handler_default+0x14/0x90 05:48:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 232.879668] ? phys_mem_access_encrypted+0x10/0x10 [ 232.884611] ? no_context+0xce/0x940 [ 232.888338] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 232.894057] ? bad_area_access_error+0x23b/0x4a0 [ 232.898829] cache_grow_begin+0xa4/0x8a0 [ 232.902898] ? setup_fault_attr+0x200/0x200 [ 232.907225] ? lock_acquire+0x170/0x3c0 [ 232.911206] cache_alloc_refill+0x273/0x340 [ 232.915526] kmem_cache_alloc+0x346/0x370 [ 232.919668] getname_flags+0xce/0x590 [ 232.923458] user_path_at_empty+0x2a/0x50 [ 232.927608] do_mount+0x147/0x2f10 [ 232.931146] ? cmp_ex_sort+0xc0/0xc0 [ 232.934860] ? __do_page_fault+0x180/0xd60 [ 232.939091] ? copy_mount_string+0x40/0x40 [ 232.943361] ? memset+0x20/0x40 [ 232.946640] ? copy_mount_options+0x26f/0x380 [ 232.951237] ksys_mount+0xcf/0x130 [ 232.954788] __x64_sys_mount+0xba/0x150 [ 232.958772] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 232.963354] do_syscall_64+0xf9/0x620 [ 232.967159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.972341] RIP: 0033:0x46702a [ 232.975519] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.994541] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.002255] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 233.009532] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 233.016806] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 233.024070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 233.031338] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 233.044331] erofs: unmounted for /dev/loop3 [ 233.062241] erofs: read_super, device -> /dev/loop0 [ 233.067427] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 233.080016] erofs: read_super, device -> /dev/loop4 [ 233.085586] erofs: options -> [ 233.094019] erofs: blksize 1 isn't supported on this platform [ 233.104310] erofs: cannot find valid erofs superblock 05:48:45 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 233.200315] erofs: read_super, device -> /dev/loop5 [ 233.202068] erofs: read_super, device -> /dev/loop3 [ 233.214855] erofs: read_super, device -> /dev/loop1 [ 233.219325] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 233.220502] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 233.236726] erofs: options -> acl,noacl, [ 233.237566] erofs: blksize 1 isn't supported on this platform 05:48:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 233.258910] erofs: cannot find valid erofs superblock 05:48:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 233.299429] erofs: unmounted for /dev/loop3 05:48:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 233.369348] erofs: read_super, device -> /dev/loop2 [ 233.378918] FAULT_INJECTION: forcing a failure. [ 233.378918] name failslab, interval 1, probability 0, space 0, times 0 [ 233.385535] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 233.404656] CPU: 1 PID: 15860 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 233.406515] erofs: cannot find valid erofs superblock [ 233.412572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.412578] Call Trace: [ 233.412604] dump_stack+0x1fc/0x2ef [ 233.412623] should_fail.cold+0xa/0xf [ 233.412641] ? setup_fault_attr+0x200/0x200 [ 233.412657] ? lock_acquire+0x170/0x3c0 [ 233.412677] __should_failslab+0x115/0x180 [ 233.412693] should_failslab+0x5/0x10 [ 233.412707] kmem_cache_alloc+0x277/0x370 [ 233.412724] alloc_vfsmnt+0x23/0x780 [ 233.412736] ? _raw_read_unlock+0x29/0x40 05:48:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 233.412752] vfs_kern_mount.part.0+0x27/0x470 [ 233.412771] do_mount+0x113c/0x2f10 [ 233.412786] ? cmp_ex_sort+0xc0/0xc0 [ 233.412803] ? __do_page_fault+0x180/0xd60 [ 233.412820] ? copy_mount_string+0x40/0x40 [ 233.412842] ? memset+0x20/0x40 [ 233.412857] ? copy_mount_options+0x26f/0x380 [ 233.412876] ksys_mount+0xcf/0x130 [ 233.412893] __x64_sys_mount+0xba/0x150 [ 233.412908] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 233.412923] do_syscall_64+0xf9/0x620 [ 233.412940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.412950] RIP: 0033:0x46702a [ 233.412965] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.412973] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.412987] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 233.412996] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 233.413004] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 05:48:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:45 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 233.413013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 233.413022] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 233.638187] erofs: read_super, device -> /dev/loop0 [ 233.643235] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 233.652433] erofs: cannot find valid erofs superblock [ 233.727046] erofs: read_super, device -> /dev/loop3 [ 233.732329] erofs: options -> acl,noacl, [ 233.756653] erofs: read_super, device -> /dev/loop1 [ 233.764221] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 233.854822] erofs: blksize 1 isn't supported on this platform [ 233.869900] erofs: unmounted for /dev/loop3 [ 233.898637] FAULT_INJECTION: forcing a failure. [ 233.898637] name failslab, interval 1, probability 0, space 0, times 0 [ 233.910273] CPU: 1 PID: 15897 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 233.918175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.927535] Call Trace: [ 233.930142] dump_stack+0x1fc/0x2ef [ 233.933789] should_fail.cold+0xa/0xf [ 233.937609] ? setup_fault_attr+0x200/0x200 [ 233.941949] ? lock_acquire+0x170/0x3c0 [ 233.945944] __should_failslab+0x115/0x180 [ 233.950196] should_failslab+0x5/0x10 [ 233.954007] kmem_cache_alloc+0x277/0x370 [ 233.958170] getname_kernel+0x4e/0x370 [ 233.962070] kern_path+0x1b/0x40 [ 233.965429] lookup_bdev+0xfc/0x220 [ 233.969041] ? bd_acquire+0x440/0x440 [ 233.972830] blkdev_get_by_path+0x1b/0xd0 [ 233.977025] mount_bdev+0x5b/0x3b0 [ 233.980554] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 233.985814] erofs_mount+0x8c/0xc0 [ 233.989337] ? erofs_kill_sb+0x20/0x20 [ 233.993219] ? alloc_pages_current+0x19b/0x2a0 [ 233.997792] ? __lockdep_init_map+0x100/0x5a0 [ 234.002277] mount_fs+0xa3/0x310 [ 234.005640] vfs_kern_mount.part.0+0x68/0x470 [ 234.010134] do_mount+0x113c/0x2f10 [ 234.013759] ? cmp_ex_sort+0xc0/0xc0 [ 234.017466] ? __do_page_fault+0x180/0xd60 [ 234.021687] ? copy_mount_string+0x40/0x40 [ 234.025912] ? memset+0x20/0x40 [ 234.029190] ? copy_mount_options+0x26f/0x380 [ 234.033686] ksys_mount+0xcf/0x130 [ 234.037216] __x64_sys_mount+0xba/0x150 [ 234.041178] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 234.045743] do_syscall_64+0xf9/0x620 [ 234.049535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.054833] RIP: 0033:0x46702a [ 234.058032] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 234.076935] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 234.084636] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 234.091939] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 234.099203] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 234.106466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 234.113717] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 234.185332] erofs: read_super, device -> /dev/loop0 [ 234.202403] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 234.218343] erofs: cannot find valid erofs superblock 05:48:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 234.305549] erofs: read_super, device -> /dev/loop3 05:48:46 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 234.326372] erofs: options -> acl,noacl, [ 234.387377] erofs: read_super, device -> /dev/loop2 [ 234.408930] erofs: read_super, device -> /dev/loop1 05:48:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 234.440049] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 234.460319] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 234.475697] erofs: root inode @ nid 36 [ 234.479954] erofs: unmounted for /dev/loop3 [ 234.481554] erofs: blksize 1 isn't supported on this platform [ 234.491839] erofs: mounted on /dev/loop2 with opts: nouser_xattr. [ 234.527493] erofs: read_super, device -> /dev/loop0 [ 234.535936] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 234.552894] erofs: cannot find valid erofs superblock [ 234.573806] FAULT_INJECTION: forcing a failure. [ 234.573806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 234.595363] erofs: read_super, device -> /dev/loop5 [ 234.610839] CPU: 0 PID: 15933 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 234.618764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.619603] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 234.628121] Call Trace: [ 234.628150] dump_stack+0x1fc/0x2ef [ 234.628169] should_fail.cold+0xa/0xf [ 234.628185] ? lock_acquire+0x170/0x3c0 [ 234.628201] ? setup_fault_attr+0x200/0x200 [ 234.628230] __alloc_pages_nodemask+0x239/0x2890 [ 234.628245] ? pcpu_alloc+0x91f/0x1190 [ 234.628261] ? mark_held_locks+0xf0/0xf0 [ 234.628277] ? pcpu_alloc+0xe78/0x1190 [ 234.628301] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 234.628324] ? check_preemption_disabled+0x41/0x280 [ 234.628344] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 234.628358] ? pcpu_alloc+0xc9/0x1190 [ 234.628376] alloc_pages_current+0x193/0x2a0 [ 234.628391] ? __lockdep_init_map+0x100/0x5a0 [ 234.628405] get_zeroed_page+0x10/0x40 [ 234.628417] mount_fs+0x203/0x310 [ 234.628437] vfs_kern_mount.part.0+0x68/0x470 [ 234.628455] do_mount+0x113c/0x2f10 [ 234.628471] ? cmp_ex_sort+0xc0/0xc0 [ 234.628489] ? __do_page_fault+0x180/0xd60 [ 234.628505] ? copy_mount_string+0x40/0x40 [ 234.628525] ? memset+0x20/0x40 [ 234.628543] ? copy_mount_options+0x26f/0x380 [ 234.661793] erofs: root inode @ nid 36 [ 234.662634] ksys_mount+0xcf/0x130 [ 234.662653] __x64_sys_mount+0xba/0x150 [ 234.662674] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 234.668579] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 234.670646] do_syscall_64+0xf9/0x620 [ 234.670669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.670679] RIP: 0033:0x46702a [ 234.670695] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 234.786695] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:48:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 234.794423] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 234.801704] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 234.808988] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 234.816269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 234.823563] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 234.841107] erofs: unmounted for /dev/loop2 05:48:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 234.926248] erofs: unmounted for /dev/loop5 [ 234.955239] erofs: read_super, device -> /dev/loop3 [ 234.981514] erofs: options -> acl,noacl, 05:48:47 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 235.044889] erofs: read_super, device -> /dev/loop5 05:48:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 235.078062] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 235.088966] erofs: unmounted for /dev/loop3 [ 235.103107] erofs: read_super, device -> /dev/loop1 [ 235.103544] erofs: root inode @ nid 36 [ 235.113565] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 235.117302] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 235.137454] erofs: read_super, device -> /dev/loop0 [ 235.142491] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 235.148212] erofs: blksize 1 isn't supported on this platform [ 235.163296] erofs: cannot find valid erofs superblock [ 235.182329] FAULT_INJECTION: forcing a failure. [ 235.182329] name failslab, interval 1, probability 0, space 0, times 0 [ 235.219056] CPU: 1 PID: 15972 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 235.226979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.236360] Call Trace: [ 235.238941] dump_stack+0x1fc/0x2ef [ 235.242551] should_fail.cold+0xa/0xf [ 235.246334] ? setup_fault_attr+0x200/0x200 [ 235.250639] ? lock_acquire+0x170/0x3c0 [ 235.254600] __should_failslab+0x115/0x180 [ 235.258824] should_failslab+0x5/0x10 [ 235.262608] kmem_cache_alloc+0x277/0x370 [ 235.266739] getname_kernel+0x4e/0x370 [ 235.270607] kern_path+0x1b/0x40 [ 235.273953] lookup_bdev+0xfc/0x220 [ 235.277586] ? bd_acquire+0x440/0x440 [ 235.281371] blkdev_get_by_path+0x1b/0xd0 [ 235.285497] mount_bdev+0x5b/0x3b0 [ 235.289020] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 235.294279] erofs_mount+0x8c/0xc0 [ 235.297799] ? erofs_kill_sb+0x20/0x20 [ 235.301675] ? alloc_pages_current+0x19b/0x2a0 [ 235.306238] ? __lockdep_init_map+0x100/0x5a0 [ 235.310715] mount_fs+0xa3/0x310 [ 235.314067] vfs_kern_mount.part.0+0x68/0x470 [ 235.318547] do_mount+0x113c/0x2f10 [ 235.322153] ? cmp_ex_sort+0xc0/0xc0 [ 235.325909] ? __do_page_fault+0x180/0xd60 [ 235.330125] ? copy_mount_string+0x40/0x40 [ 235.334394] ? memset+0x20/0x40 [ 235.337665] ? copy_mount_options+0x26f/0x380 [ 235.342148] ksys_mount+0xcf/0x130 [ 235.345673] __x64_sys_mount+0xba/0x150 [ 235.349631] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 235.354194] do_syscall_64+0xf9/0x620 [ 235.358061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.363228] RIP: 0033:0x46702a [ 235.366400] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:48:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 235.385279] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 235.392967] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 235.400217] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 235.407483] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 235.414732] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 235.421982] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 235.446686] erofs: unmounted for /dev/loop5 05:48:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:47 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 235.629914] erofs: read_super, device -> /dev/loop3 [ 235.641111] erofs: options -> acl,noacl, [ 235.669925] erofs: read_super, device -> /dev/loop0 [ 235.679568] erofs: read_super, device -> /dev/loop5 [ 235.682824] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 235.690833] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 235.713688] erofs: read_super, device -> /dev/loop1 [ 235.724103] erofs: root inode @ nid 36 [ 235.725913] FAULT_INJECTION: forcing a failure. [ 235.725913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 235.729403] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 235.763005] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 235.763010] erofs: cannot find valid erofs superblock 05:48:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 235.764490] CPU: 1 PID: 15999 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 235.772675] erofs: blksize 1 isn't supported on this platform [ 235.774468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.774476] Call Trace: [ 235.774498] dump_stack+0x1fc/0x2ef [ 235.774517] should_fail.cold+0xa/0xf [ 235.807522] ? lock_acquire+0x170/0x3c0 [ 235.811481] ? setup_fault_attr+0x200/0x200 [ 235.815795] __alloc_pages_nodemask+0x239/0x2890 [ 235.820537] ? pcpu_alloc+0x91f/0x1190 [ 235.824407] ? mark_held_locks+0xf0/0xf0 [ 235.828453] ? pcpu_alloc+0xe78/0x1190 [ 235.832329] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 235.837159] ? check_preemption_disabled+0x41/0x280 [ 235.842160] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 235.847219] ? pcpu_alloc+0xc9/0x1190 [ 235.851007] alloc_pages_current+0x193/0x2a0 [ 235.855400] ? __lockdep_init_map+0x100/0x5a0 [ 235.859887] get_zeroed_page+0x10/0x40 [ 235.863756] mount_fs+0x203/0x310 [ 235.867207] vfs_kern_mount.part.0+0x68/0x470 [ 235.871696] do_mount+0x113c/0x2f10 [ 235.875378] ? cmp_ex_sort+0xc0/0xc0 [ 235.879077] ? __do_page_fault+0x180/0xd60 [ 235.883295] ? copy_mount_string+0x40/0x40 [ 235.887519] ? memset+0x20/0x40 [ 235.890783] ? copy_mount_options+0x26f/0x380 [ 235.895263] ksys_mount+0xcf/0x130 [ 235.898814] __x64_sys_mount+0xba/0x150 [ 235.902896] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 235.907511] do_syscall_64+0xf9/0x620 [ 235.911311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.916492] RIP: 0033:0x46702a [ 235.919666] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 235.938549] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 235.946240] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 235.953492] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 235.960756] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 235.969957] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 235.977223] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 235.984669] erofs: unmounted for /dev/loop3 05:48:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:48:48 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 236.063529] erofs: unmounted for /dev/loop5 05:48:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 236.270243] FAULT_INJECTION: forcing a failure. [ 236.270243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 236.282094] CPU: 1 PID: 16018 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 236.289981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.299342] Call Trace: [ 236.301950] dump_stack+0x1fc/0x2ef [ 236.305592] should_fail.cold+0xa/0xf [ 236.309408] ? setup_fault_attr+0x200/0x200 [ 236.313754] ? get_page_from_freelist+0x1d60/0x4170 [ 236.318779] __alloc_pages_nodemask+0x239/0x2890 [ 236.323533] ? get_page_from_freelist+0x1d60/0x4170 [ 236.328534] ? bad_range+0x260/0x3c0 [ 236.332238] ? __lock_acquire+0x6de/0x3ff0 [ 236.336471] ? preempt_count_add+0xaf/0x190 [ 236.340790] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 236.345621] ? mark_held_locks+0xf0/0xf0 [ 236.349669] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.355036] cache_grow_begin+0xa4/0x8a0 [ 236.359094] ? setup_fault_attr+0x200/0x200 [ 236.363400] ? lock_acquire+0x170/0x3c0 [ 236.367357] cache_alloc_refill+0x273/0x340 [ 236.371665] kmem_cache_alloc+0x346/0x370 [ 236.375799] getname_kernel+0x4e/0x370 [ 236.379681] kern_path+0x1b/0x40 [ 236.383053] lookup_bdev+0xfc/0x220 [ 236.386727] ? bd_acquire+0x440/0x440 [ 236.390514] blkdev_get_by_path+0x1b/0xd0 [ 236.394649] mount_bdev+0x5b/0x3b0 [ 236.398177] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 236.403450] erofs_mount+0x8c/0xc0 [ 236.407035] ? erofs_kill_sb+0x20/0x20 [ 236.410953] ? alloc_pages_current+0x19b/0x2a0 [ 236.415535] ? __lockdep_init_map+0x100/0x5a0 [ 236.420022] mount_fs+0xa3/0x310 [ 236.423382] vfs_kern_mount.part.0+0x68/0x470 [ 236.427864] do_mount+0x113c/0x2f10 [ 236.431478] ? cmp_ex_sort+0xc0/0xc0 [ 236.435200] ? __do_page_fault+0x180/0xd60 [ 236.439434] ? copy_mount_string+0x40/0x40 [ 236.443664] ? memset+0x20/0x40 [ 236.446944] ? copy_mount_options+0x26f/0x380 [ 236.451426] ksys_mount+0xcf/0x130 [ 236.454957] __x64_sys_mount+0xba/0x150 [ 236.458920] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 236.463495] do_syscall_64+0xf9/0x620 [ 236.467283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.472456] RIP: 0033:0x46702a [ 236.475633] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.494525] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 236.502234] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 236.509498] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 236.516754] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 236.524016] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 236.531289] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 236.568957] erofs: read_super, device -> /dev/loop4 [ 236.574583] erofs: options -> [ 236.584489] erofs: blksize 1 isn't supported on this platform 05:48:48 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 236.629572] erofs: read_super, device -> /dev/loop0 [ 236.634827] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 236.652749] erofs: cannot find valid erofs superblock 05:48:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 236.710315] erofs: read_super, device -> /dev/loop3 [ 236.715370] erofs: options -> acl,noacl, [ 236.723121] erofs: read_super, device -> /dev/loop5 [ 236.728170] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 236.735037] erofs: read_super, device -> /dev/loop1 [ 236.751870] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 236.789804] erofs: root inode @ nid 36 [ 236.793821] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 236.806764] erofs: read_super, device -> /dev/loop2 [ 236.808436] erofs: blksize 1 isn't supported on this platform [ 236.822651] erofs: options -> nouser_xattr,acl,noacl, [ 236.830471] erofs: root inode @ nid 36 [ 236.834410] erofs: unmounted for /dev/loop3 [ 236.841469] FAULT_INJECTION: forcing a failure. [ 236.841469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 236.843845] erofs: mounted on /dev/loop2 with opts: nouser_xattr. [ 236.853549] CPU: 0 PID: 16052 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 236.853568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.853574] Call Trace: [ 236.853600] dump_stack+0x1fc/0x2ef [ 236.853617] should_fail.cold+0xa/0xf [ 236.853634] ? setup_fault_attr+0x200/0x200 05:48:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 236.853649] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 236.853668] ? mark_held_locks+0xf0/0xf0 [ 236.853681] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 236.853700] __alloc_pages_nodemask+0x239/0x2890 [ 236.909915] ? __lock_acquire+0x6de/0x3ff0 [ 236.914170] ? __lock_acquire+0x6de/0x3ff0 [ 236.918460] ? __lock_acquire+0x6de/0x3ff0 [ 236.922712] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 236.927565] ? mark_held_locks+0xf0/0xf0 [ 236.931642] ? mark_held_locks+0xf0/0xf0 [ 236.935716] ? lock_downgrade+0x720/0x720 [ 236.939877] ? blkdev_get+0x4ce/0x940 [ 236.943692] cache_grow_begin+0xa4/0x8a0 [ 236.947765] ? setup_fault_attr+0x200/0x200 [ 236.952091] ? lock_acquire+0x170/0x3c0 [ 236.956076] cache_alloc_refill+0x273/0x340 [ 236.960415] kmem_cache_alloc_trace+0x354/0x380 [ 236.965082] ? set_bdev_super+0x110/0x110 [ 236.969213] ? ns_test_super+0x50/0x50 [ 236.973088] sget_userns+0x122/0xcd0 [ 236.976796] ? set_bdev_super+0x110/0x110 [ 236.980950] ? ns_test_super+0x50/0x50 [ 236.984843] ? set_bdev_super+0x110/0x110 [ 236.988999] ? ns_test_super+0x50/0x50 [ 236.992889] sget+0x102/0x140 [ 236.995993] mount_bdev+0xf8/0x3b0 [ 236.999526] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 237.004810] erofs_mount+0x8c/0xc0 [ 237.008351] ? erofs_kill_sb+0x20/0x20 [ 237.012234] ? alloc_pages_current+0x19b/0x2a0 [ 237.016803] ? __lockdep_init_map+0x100/0x5a0 [ 237.021297] mount_fs+0xa3/0x310 [ 237.024679] vfs_kern_mount.part.0+0x68/0x470 [ 237.029173] do_mount+0x113c/0x2f10 [ 237.032798] ? cmp_ex_sort+0xc0/0xc0 [ 237.036525] ? __do_page_fault+0x180/0xd60 [ 237.040764] ? copy_mount_string+0x40/0x40 [ 237.045013] ? memset+0x20/0x40 [ 237.048292] ? copy_mount_options+0x26f/0x380 [ 237.052845] ksys_mount+0xcf/0x130 [ 237.056389] __x64_sys_mount+0xba/0x150 [ 237.060367] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 237.064948] do_syscall_64+0xf9/0x620 [ 237.068738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.073912] RIP: 0033:0x46702a [ 237.077090] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.095978] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 237.103685] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 237.110962] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 237.118230] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 237.125487] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 237.132798] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 05:48:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 237.150149] erofs: unmounted for /dev/loop2 [ 237.151521] erofs: read_super, device -> /dev/loop4 [ 237.159734] erofs: unmounted for /dev/loop5 [ 237.159760] erofs: options -> [ 237.172784] erofs: read_super, device -> /dev/loop0 [ 237.173152] erofs: blksize 1 isn't supported on this platform [ 237.177813] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 237.278229] erofs: unmounted for /dev/loop0 [ 237.340663] erofs: read_super, device -> /dev/loop3 [ 237.346715] erofs: options -> acl,noacl, [ 237.371506] erofs: read_super, device -> /dev/loop2 [ 237.374628] erofs: read_super, device -> /dev/loop5 [ 237.381685] erofs: options -> nouser_xattr,acl, [ 237.381742] erofs: root inode @ nid 36 [ 237.381818] erofs: mounted on /dev/loop2 with opts: nouser_xattr. 05:48:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}]}) 05:48:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:49 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 237.431970] erofs: options -> nouser_xattr,acl,noacl, [ 237.442944] erofs: read_super, device -> /dev/loop1 [ 237.448118] erofs: unmounted for /dev/loop2 [ 237.471555] erofs: unmounted for /dev/loop3 [ 237.473315] erofs: root inode @ nid 36 [ 237.479243] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 237.480008] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 237.551714] erofs: read_super, device -> /dev/loop0 [ 237.556948] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 237.566289] erofs: cannot find valid erofs superblock 05:48:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 237.637251] erofs: read_super, device -> /dev/loop2 [ 237.646242] erofs: options -> nouser_xattr, [ 237.652804] erofs: root inode @ nid 36 [ 237.657126] erofs: mounted on /dev/loop2 with opts: nouser_xattr. [ 237.657998] erofs: unmounted for /dev/loop5 [ 237.681672] erofs: read_super, device -> /dev/loop3 05:48:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 237.687275] erofs: options -> acl,noacl, [ 237.712383] FAULT_INJECTION: forcing a failure. [ 237.712383] name failslab, interval 1, probability 0, space 0, times 0 [ 237.738560] erofs: read_super, device -> /dev/loop0 [ 237.764878] CPU: 1 PID: 16095 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 237.767680] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 237.772803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.772816] Call Trace: [ 237.772844] dump_stack+0x1fc/0x2ef [ 237.772862] should_fail.cold+0xa/0xf [ 237.772880] ? setup_fault_attr+0x200/0x200 [ 237.772896] ? lock_acquire+0x170/0x3c0 [ 237.772918] __should_failslab+0x115/0x180 [ 237.772943] should_failslab+0x5/0x10 [ 237.772957] __kmalloc+0x2ab/0x3c0 [ 237.772972] ? prealloc_shrinker+0x15d/0x340 [ 237.772989] prealloc_shrinker+0x15d/0x340 [ 237.805798] erofs: cannot find valid erofs superblock [ 237.808745] sget_userns+0x7b4/0xcd0 [ 237.808758] ? set_bdev_super+0x110/0x110 [ 237.808775] ? ns_test_super+0x50/0x50 [ 237.845848] ? set_bdev_super+0x110/0x110 [ 237.850019] ? ns_test_super+0x50/0x50 [ 237.853924] sget+0x102/0x140 [ 237.857046] mount_bdev+0xf8/0x3b0 05:48:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 237.860606] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 237.865899] erofs_mount+0x8c/0xc0 [ 237.869451] ? erofs_kill_sb+0x20/0x20 [ 237.873353] ? alloc_pages_current+0x19b/0x2a0 [ 237.877924] ? __lockdep_init_map+0x100/0x5a0 [ 237.882456] mount_fs+0xa3/0x310 [ 237.885814] vfs_kern_mount.part.0+0x68/0x470 [ 237.890299] do_mount+0x113c/0x2f10 [ 237.893914] ? cmp_ex_sort+0xc0/0xc0 [ 237.897662] ? __do_page_fault+0x180/0xd60 [ 237.901897] ? copy_mount_string+0x40/0x40 [ 237.906132] ? memset+0x20/0x40 [ 237.909414] ? copy_mount_options+0x26f/0x380 [ 237.913895] ksys_mount+0xcf/0x130 [ 237.917421] __x64_sys_mount+0xba/0x150 [ 237.921391] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 237.926036] do_syscall_64+0xf9/0x620 [ 237.929825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.935012] RIP: 0033:0x46702a [ 237.938212] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.957112] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:48:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 237.964818] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 237.972077] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 237.979330] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 237.986584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 237.993838] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 238.008026] erofs: unmounted for /dev/loop2 [ 238.020285] erofs: unmounted for /dev/loop3 [ 238.025737] erofs: read_super, device -> /dev/loop5 [ 238.039563] erofs: read_super, device -> /dev/loop1 [ 238.045458] erofs: options -> nouser_xattr,acl, [ 238.047513] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 238.063933] erofs: root inode @ nid 36 05:48:50 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:48:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 238.076965] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 238.110958] erofs: unmounted for /dev/loop5 05:48:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 238.196712] erofs: read_super, device -> /dev/loop0 [ 238.214943] erofs: read_super, device -> /dev/loop2 [ 238.220445] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 238.221258] erofs: options -> [ 238.239730] erofs: cannot find valid erofs superblock [ 238.259333] erofs: root inode @ nid 36 [ 238.272907] erofs: mounted on /dev/loop2 with opts: . [ 238.302477] FAULT_INJECTION: forcing a failure. [ 238.302477] name failslab, interval 1, probability 0, space 0, times 0 [ 238.315016] CPU: 1 PID: 16142 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 238.322917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.332278] Call Trace: [ 238.334883] dump_stack+0x1fc/0x2ef [ 238.338529] should_fail.cold+0xa/0xf [ 238.342345] ? setup_fault_attr+0x200/0x200 [ 238.346679] ? lock_acquire+0x170/0x3c0 [ 238.350664] __should_failslab+0x115/0x180 [ 238.354906] should_failslab+0x5/0x10 [ 238.356306] erofs: read_super, device -> /dev/loop5 [ 238.358709] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 238.368814] __kmalloc_node+0x38/0x70 [ 238.372628] kvmalloc_node+0x61/0xf0 [ 238.372913] erofs: options -> nouser_xattr,acl, [ 238.376347] __list_lru_init+0x4c6/0x7f0 [ 238.376364] ? up_read+0xa3/0x110 [ 238.376385] sget_userns+0x7e2/0xcd0 [ 238.376400] ? set_bdev_super+0x110/0x110 [ 238.376416] ? ns_test_super+0x50/0x50 [ 238.376434] ? set_bdev_super+0x110/0x110 [ 238.397102] erofs: root inode @ nid 36 [ 238.400295] ? ns_test_super+0x50/0x50 [ 238.400312] sget+0x102/0x140 [ 238.400330] mount_bdev+0xf8/0x3b0 [ 238.400348] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 238.400367] erofs_mount+0x8c/0xc0 [ 238.417187] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 238.418875] ? erofs_kill_sb+0x20/0x20 [ 238.418899] ? alloc_pages_current+0x19b/0x2a0 [ 238.418915] ? __lockdep_init_map+0x100/0x5a0 [ 238.418928] mount_fs+0xa3/0x310 [ 238.418946] vfs_kern_mount.part.0+0x68/0x470 [ 238.454721] do_mount+0x113c/0x2f10 [ 238.458363] ? cmp_ex_sort+0xc0/0xc0 [ 238.462092] ? __do_page_fault+0x180/0xd60 [ 238.466344] ? copy_mount_string+0x40/0x40 [ 238.470601] ? memset+0x20/0x40 [ 238.473900] ? copy_mount_options+0x26f/0x380 [ 238.478413] ksys_mount+0xcf/0x130 [ 238.481977] __x64_sys_mount+0xba/0x150 [ 238.485975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 238.490567] do_syscall_64+0xf9/0x620 [ 238.494384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.499568] RIP: 0033:0x46702a [ 238.502761] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.521667] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.529388] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 238.536670] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 238.543950] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 05:48:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 238.551236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 238.558517] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 238.568547] erofs: unmounted for /dev/loop2 05:48:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 238.601867] erofs: unmounted for /dev/loop5 [ 238.616662] erofs: read_super, device -> /dev/loop1 [ 238.635908] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 238.648267] erofs: read_super, device -> /dev/loop3 [ 238.697904] erofs: options -> acl,noacl, 05:48:50 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 238.780809] erofs: read_super, device -> /dev/loop0 05:48:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 238.803830] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 238.812120] erofs: unmounted for /dev/loop3 [ 238.836680] erofs: read_super, device -> /dev/loop5 05:48:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 238.858777] erofs: read_super, device -> /dev/loop2 [ 238.865629] FAULT_INJECTION: forcing a failure. [ 238.865629] name failslab, interval 1, probability 0, space 0, times 0 [ 238.868905] erofs: options -> nouser_xattr,acl, [ 238.890964] erofs: unmounted for /dev/loop0 [ 238.896680] CPU: 0 PID: 16175 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 238.902004] erofs: options -> nouser_xattr,acl, [ 238.904584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.904589] Call Trace: [ 238.904615] dump_stack+0x1fc/0x2ef [ 238.904634] should_fail.cold+0xa/0xf [ 238.904652] ? setup_fault_attr+0x200/0x200 [ 238.904670] ? lock_acquire+0x170/0x3c0 [ 238.904691] __should_failslab+0x115/0x180 [ 238.904706] should_failslab+0x5/0x10 [ 238.904719] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 238.904737] __kmalloc_node+0x38/0x70 [ 238.919225] erofs: root inode @ nid 36 [ 238.921327] kvmalloc_node+0x61/0xf0 [ 238.921347] __list_lru_init+0x4c6/0x7f0 [ 238.921360] ? up_read+0xa3/0x110 [ 238.921379] sget_userns+0x7e2/0xcd0 [ 238.930315] erofs: root inode @ nid 36 [ 238.933111] ? set_bdev_super+0x110/0x110 [ 238.933133] ? ns_test_super+0x50/0x50 [ 238.933149] ? set_bdev_super+0x110/0x110 [ 238.933161] ? ns_test_super+0x50/0x50 [ 238.933174] sget+0x102/0x140 [ 238.933190] mount_bdev+0xf8/0x3b0 [ 238.933206] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 238.933222] erofs_mount+0x8c/0xc0 [ 238.933236] ? erofs_kill_sb+0x20/0x20 [ 238.933253] ? alloc_pages_current+0x19b/0x2a0 [ 238.933271] ? __lockdep_init_map+0x100/0x5a0 [ 238.945476] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 238.950332] mount_fs+0xa3/0x310 [ 238.950355] vfs_kern_mount.part.0+0x68/0x470 [ 238.950374] do_mount+0x113c/0x2f10 [ 238.950390] ? cmp_ex_sort+0xc0/0xc0 [ 238.950405] ? __do_page_fault+0x180/0xd60 [ 238.950426] ? copy_mount_string+0x40/0x40 [ 238.950449] ? memset+0x20/0x40 [ 238.950462] ? copy_mount_options+0x26f/0x380 [ 238.950481] ksys_mount+0xcf/0x130 [ 238.950499] __x64_sys_mount+0xba/0x150 [ 238.950514] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 238.950529] do_syscall_64+0xf9/0x620 [ 238.950547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.950557] RIP: 0033:0x46702a [ 238.950572] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.950580] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.950594] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 238.950602] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 238.950611] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 238.950619] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 238.950628] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 238.956609] erofs: mounted on /dev/loop2 with opts: nouser_xattr. 05:48:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:48:51 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 239.194303] erofs: read_super, device -> /dev/loop3 [ 239.213773] erofs: options -> acl,noacl, [ 239.221557] erofs: unmounted for /dev/loop5 05:48:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 239.275586] erofs: read_super, device -> /dev/loop1 [ 239.279724] erofs: read_super, device -> /dev/loop0 [ 239.280625] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 239.301336] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 239.311474] erofs: unmounted for /dev/loop1 [ 239.313546] erofs: cannot find valid erofs superblock 05:48:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024000000000000000000e80300000000000000000000020000000000000000000000e2b40a7e6a21434794c3ee542307f1d5", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 239.390564] erofs: unmounted for /dev/loop3 [ 239.425649] erofs: unmounted for /dev/loop2 05:48:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 239.493713] erofs: read_super, device -> /dev/loop5 [ 239.498780] erofs: options -> nouser_xattr,noacl, [ 239.505515] erofs: root inode @ nid 36 [ 239.509548] FAULT_INJECTION: forcing a failure. [ 239.509548] name failslab, interval 1, probability 0, space 0, times 0 [ 239.530050] erofs: read_super, device -> /dev/loop1 [ 239.548887] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 239.559942] CPU: 1 PID: 16203 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 239.563344] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 239.567841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.567847] Call Trace: [ 239.567872] dump_stack+0x1fc/0x2ef [ 239.567890] should_fail.cold+0xa/0xf 05:48:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 239.567905] ? setup_fault_attr+0x200/0x200 [ 239.567923] ? lock_acquire+0x170/0x3c0 [ 239.603655] __should_failslab+0x115/0x180 [ 239.607917] should_failslab+0x5/0x10 [ 239.611733] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 239.616852] __kmalloc_node+0x38/0x70 [ 239.620668] kvmalloc_node+0x61/0xf0 [ 239.624393] __list_lru_init+0x4c6/0x7f0 [ 239.628465] ? up_read+0xa3/0x110 [ 239.631932] sget_userns+0x7e2/0xcd0 [ 239.635654] ? set_bdev_super+0x110/0x110 [ 239.639811] ? ns_test_super+0x50/0x50 [ 239.643707] ? set_bdev_super+0x110/0x110 [ 239.647861] ? ns_test_super+0x50/0x50 [ 239.651758] sget+0x102/0x140 [ 239.654875] mount_bdev+0xf8/0x3b0 [ 239.658417] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 239.663687] erofs_mount+0x8c/0xc0 [ 239.667219] ? erofs_kill_sb+0x20/0x20 [ 239.671105] ? alloc_pages_current+0x19b/0x2a0 [ 239.675678] ? __lockdep_init_map+0x100/0x5a0 [ 239.680167] mount_fs+0xa3/0x310 [ 239.683520] vfs_kern_mount.part.0+0x68/0x470 [ 239.688031] do_mount+0x113c/0x2f10 [ 239.691654] ? cmp_ex_sort+0xc0/0xc0 [ 239.695375] ? __do_page_fault+0x180/0xd60 [ 239.699604] ? copy_mount_string+0x40/0x40 [ 239.703836] ? memset+0x20/0x40 [ 239.707113] ? copy_mount_options+0x26f/0x380 [ 239.711609] ksys_mount+0xcf/0x130 [ 239.715137] __x64_sys_mount+0xba/0x150 [ 239.719098] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 239.723670] do_syscall_64+0xf9/0x620 [ 239.727476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.732665] RIP: 0033:0x46702a [ 239.735849] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.754731] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 239.762425] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 239.769680] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 239.776938] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 239.784200] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 239.791462] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 239.850973] erofs: read_super, device -> /dev/loop3 05:48:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 239.875812] erofs: options -> acl,noacl, [ 239.895643] erofs: read_super, device -> /dev/loop2 [ 239.900822] erofs: unmounted for /dev/loop5 [ 239.904328] erofs: read_super, device -> /dev/loop0 [ 239.910157] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 239.931629] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 239.960345] erofs: read_super, device -> /dev/loop1 [ 239.960414] erofs: cannot find valid erofs superblock [ 239.969480] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:52 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 239.994586] erofs: unmounted for /dev/loop3 05:48:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 240.168864] erofs: read_super, device -> /dev/loop5 [ 240.206510] erofs: read_super, device -> /dev/loop4 [ 240.218814] erofs: options -> nouser_xattr,noacl, [ 240.223948] erofs: root inode @ nid 36 [ 240.240468] erofs: options -> 05:48:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 240.267714] erofs: read_super, device -> /dev/loop0 [ 240.271216] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 240.296265] FAULT_INJECTION: forcing a failure. [ 240.296265] name failslab, interval 1, probability 0, space 0, times 0 05:48:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 240.316789] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 240.342316] erofs: read_super, device -> /dev/loop3 [ 240.348173] CPU: 0 PID: 16246 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 240.356071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:48:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 240.361229] erofs: cannot find valid erofs superblock [ 240.365424] Call Trace: [ 240.365450] dump_stack+0x1fc/0x2ef [ 240.365469] should_fail.cold+0xa/0xf [ 240.365485] ? setup_fault_attr+0x200/0x200 [ 240.365500] ? lock_acquire+0x170/0x3c0 [ 240.365520] __should_failslab+0x115/0x180 [ 240.365537] should_failslab+0x5/0x10 [ 240.365551] kmem_cache_alloc_trace+0x284/0x380 [ 240.365570] erofs_fill_super+0x167/0x12cc [ 240.365589] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 240.365605] ? vsprintf+0x30/0x30 [ 240.389756] erofs: options -> acl,noacl, [ 240.393271] ? wait_for_completion_io+0x10/0x10 [ 240.393286] ? set_blocksize+0x163/0x3f0 [ 240.393304] mount_bdev+0x2fc/0x3b0 [ 240.431107] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 240.436392] erofs_mount+0x8c/0xc0 [ 240.439929] ? erofs_kill_sb+0x20/0x20 [ 240.443803] ? alloc_pages_current+0x19b/0x2a0 [ 240.448370] ? __lockdep_init_map+0x100/0x5a0 [ 240.452976] mount_fs+0xa3/0x310 [ 240.456356] vfs_kern_mount.part.0+0x68/0x470 [ 240.460858] do_mount+0x113c/0x2f10 [ 240.464482] ? cmp_ex_sort+0xc0/0xc0 [ 240.468194] ? __do_page_fault+0x180/0xd60 [ 240.472420] ? copy_mount_string+0x40/0x40 [ 240.476670] ? memset+0x20/0x40 [ 240.479952] ? copy_mount_options+0x26f/0x380 [ 240.484436] ksys_mount+0xcf/0x130 [ 240.487985] __x64_sys_mount+0xba/0x150 [ 240.491959] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 240.496543] do_syscall_64+0xf9/0x620 [ 240.500339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.505514] RIP: 0033:0x46702a [ 240.508691] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.527642] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.535348] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 240.542615] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 240.549870] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 240.557135] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 240.564407] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 240.572536] erofs: unmounted for /dev/loop5 05:48:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:52 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 240.640393] erofs: read_super, device -> /dev/loop2 [ 240.652150] erofs: read_super, device -> /dev/loop1 [ 240.663652] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 240.673301] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 240.688806] erofs: unmounted for /dev/loop3 [ 240.767874] erofs: read_super, device -> /dev/loop5 [ 240.773086] erofs: options -> nouser_xattr,noacl, [ 240.785069] erofs: root inode @ nid 36 [ 240.791658] erofs: read_super, device -> /dev/loop0 [ 240.805078] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:53 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 240.813848] erofs: mounted on /dev/loop5 with opts: nouser_xattr. [ 240.824036] erofs: blksize 1 isn't supported on this platform [ 240.835773] FAULT_INJECTION: forcing a failure. [ 240.835773] name failslab, interval 1, probability 0, space 0, times 0 [ 240.847474] erofs: read_super, device -> /dev/loop3 [ 240.852509] erofs: options -> acl,noacl, [ 240.882901] CPU: 1 PID: 16281 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 240.890821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.900187] Call Trace: [ 240.902796] dump_stack+0x1fc/0x2ef [ 240.906447] should_fail.cold+0xa/0xf [ 240.910265] ? setup_fault_attr+0x200/0x200 [ 240.914602] ? lock_acquire+0x170/0x3c0 [ 240.918683] __should_failslab+0x115/0x180 [ 240.922908] should_failslab+0x5/0x10 [ 240.926711] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 240.931840] __kmalloc_node+0x38/0x70 [ 240.933137] FAULT_INJECTION: forcing a failure. [ 240.933137] name failslab, interval 1, probability 0, space 0, times 0 [ 240.935663] kvmalloc_node+0x61/0xf0 [ 240.935682] __list_lru_init+0x4c6/0x7f0 [ 240.935698] ? up_read+0xa3/0x110 [ 240.935716] sget_userns+0x810/0xcd0 [ 240.935727] ? set_bdev_super+0x110/0x110 [ 240.935749] ? ns_test_super+0x50/0x50 [ 240.969837] ? set_bdev_super+0x110/0x110 [ 240.973984] ? ns_test_super+0x50/0x50 [ 240.977866] sget+0x102/0x140 [ 240.980965] mount_bdev+0xf8/0x3b0 [ 240.984497] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 240.989769] erofs_mount+0x8c/0xc0 [ 240.993315] ? erofs_kill_sb+0x20/0x20 [ 240.997214] ? alloc_pages_current+0x19b/0x2a0 [ 241.001795] ? __lockdep_init_map+0x100/0x5a0 [ 241.006291] mount_fs+0xa3/0x310 [ 241.009657] vfs_kern_mount.part.0+0x68/0x470 [ 241.014147] do_mount+0x113c/0x2f10 [ 241.017773] ? cmp_ex_sort+0xc0/0xc0 [ 241.021477] ? __do_page_fault+0x180/0xd60 [ 241.025703] ? copy_mount_string+0x40/0x40 [ 241.029934] ? memset+0x20/0x40 [ 241.033203] ? copy_mount_options+0x26f/0x380 [ 241.037692] ksys_mount+0xcf/0x130 [ 241.041254] __x64_sys_mount+0xba/0x150 [ 241.045228] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 241.049822] do_syscall_64+0xf9/0x620 [ 241.053633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.058820] RIP: 0033:0x46702a [ 241.062003] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:48:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 241.080892] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 241.088592] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 241.095852] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 241.103108] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 241.110366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 241.117627] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 241.124912] CPU: 0 PID: 16294 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 05:48:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 241.132808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.142170] Call Trace: [ 241.144774] dump_stack+0x1fc/0x2ef [ 241.148415] should_fail.cold+0xa/0xf [ 241.152229] ? setup_fault_attr+0x200/0x200 [ 241.156550] ? lock_acquire+0x170/0x3c0 [ 241.160517] __should_failslab+0x115/0x180 [ 241.164745] should_failslab+0x5/0x10 [ 241.168531] __kmalloc+0x2ab/0x3c0 [ 241.172054] ? __se_sys_memfd_create+0xf8/0x440 [ 241.176706] __se_sys_memfd_create+0xf8/0x440 [ 241.181250] ? memfd_file_seals_ptr+0x150/0x150 [ 241.185915] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 241.191265] ? trace_hardirqs_off_caller+0x6e/0x210 [ 241.196275] ? do_syscall_64+0x21/0x620 [ 241.200257] do_syscall_64+0xf9/0x620 [ 241.204048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.209223] RIP: 0033:0x465b09 [ 241.212400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:48:53 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 241.231294] RSP: 002b:00007fd7af408f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 241.239010] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 241.246270] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 241.253531] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 241.260845] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 241.268150] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 241.276389] erofs: unmounted for /dev/loop5 05:48:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:53 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 241.363363] erofs: unmounted for /dev/loop3 [ 241.372406] FAULT_INJECTION: forcing a failure. [ 241.372406] name failslab, interval 1, probability 0, space 0, times 0 [ 241.384299] CPU: 1 PID: 16302 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 [ 241.392175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.401522] Call Trace: [ 241.404105] dump_stack+0x1fc/0x2ef [ 241.407771] should_fail.cold+0xa/0xf [ 241.411608] ? setup_fault_attr+0x200/0x200 [ 241.415917] ? lock_acquire+0x170/0x3c0 [ 241.419893] __should_failslab+0x115/0x180 [ 241.424123] should_failslab+0x5/0x10 [ 241.427909] kmem_cache_alloc+0x277/0x370 [ 241.432054] ? shmem_destroy_callback+0xb0/0xb0 [ 241.436722] shmem_alloc_inode+0x18/0x40 [ 241.440767] ? shmem_destroy_callback+0xb0/0xb0 [ 241.445420] alloc_inode+0x5d/0x180 [ 241.449028] new_inode+0x1d/0xf0 [ 241.452382] shmem_get_inode+0x96/0x8d0 [ 241.456351] __shmem_file_setup.part.0+0x7a/0x2b0 [ 241.461189] shmem_file_setup+0x61/0x90 [ 241.465147] __se_sys_memfd_create+0x26b/0x440 [ 241.469716] ? memfd_file_seals_ptr+0x150/0x150 [ 241.474370] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 241.479719] ? trace_hardirqs_off_caller+0x6e/0x210 [ 241.484718] ? do_syscall_64+0x21/0x620 [ 241.488677] do_syscall_64+0xf9/0x620 [ 241.492462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.497696] RIP: 0033:0x465b09 05:48:53 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 241.500875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.519764] RSP: 002b:00007fd7af408f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 241.527455] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 241.534705] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 241.541956] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 241.549235] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 241.556488] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 241.595190] erofs: read_super, device -> /dev/loop5 [ 241.616528] erofs: options -> acl,noacl, [ 241.622340] erofs: read_super, device -> /dev/loop0 [ 241.626953] erofs: read_super, device -> /dev/loop1 [ 241.628006] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 241.632390] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 241.663247] FAULT_INJECTION: forcing a failure. [ 241.663247] name failslab, interval 1, probability 0, space 0, times 0 [ 241.668389] erofs: blksize 1 isn't supported on this platform [ 241.681647] FAULT_INJECTION: forcing a failure. [ 241.681647] name failslab, interval 1, probability 0, space 0, times 0 [ 241.693075] CPU: 1 PID: 16313 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 241.700963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.710308] Call Trace: [ 241.712894] dump_stack+0x1fc/0x2ef [ 241.716510] should_fail.cold+0xa/0xf [ 241.720304] ? setup_fault_attr+0x200/0x200 [ 241.724614] ? lock_acquire+0x170/0x3c0 [ 241.728578] __should_failslab+0x115/0x180 [ 241.732800] should_failslab+0x5/0x10 [ 241.736588] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 241.741680] __kmalloc_node+0x38/0x70 [ 241.745471] kvmalloc_node+0x61/0xf0 [ 241.749170] __list_lru_init+0x4c6/0x7f0 [ 241.753234] ? up_read+0xa3/0x110 [ 241.756674] sget_userns+0x810/0xcd0 [ 241.760371] ? set_bdev_super+0x110/0x110 [ 241.764504] ? ns_test_super+0x50/0x50 [ 241.768377] ? set_bdev_super+0x110/0x110 [ 241.772510] ? ns_test_super+0x50/0x50 [ 241.776383] sget+0x102/0x140 [ 241.779480] mount_bdev+0xf8/0x3b0 [ 241.783006] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 241.788270] erofs_mount+0x8c/0xc0 [ 241.791794] ? erofs_kill_sb+0x20/0x20 [ 241.795783] ? alloc_pages_current+0x19b/0x2a0 [ 241.800351] ? __lockdep_init_map+0x100/0x5a0 [ 241.804833] mount_fs+0xa3/0x310 [ 241.808194] vfs_kern_mount.part.0+0x68/0x470 [ 241.812800] do_mount+0x113c/0x2f10 [ 241.816437] ? cmp_ex_sort+0xc0/0xc0 [ 241.820147] ? __do_page_fault+0x180/0xd60 [ 241.824399] ? copy_mount_string+0x40/0x40 [ 241.828627] ? memset+0x20/0x40 [ 241.831893] ? copy_mount_options+0x26f/0x380 [ 241.836377] ksys_mount+0xcf/0x130 [ 241.839904] __x64_sys_mount+0xba/0x150 [ 241.843868] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 241.848434] do_syscall_64+0xf9/0x620 [ 241.852242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.857423] RIP: 0033:0x46702a [ 241.860609] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.879758] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 241.887453] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 241.894707] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 241.901960] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 241.909215] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 241.916471] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 241.935665] erofs: cannot find valid erofs superblock [ 241.941172] erofs: root inode @ nid 36 [ 241.954137] erofs: mounted on /dev/loop5 with opts: acl. [ 241.962607] CPU: 1 PID: 16319 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 [ 241.970513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.979874] Call Trace: [ 241.982482] dump_stack+0x1fc/0x2ef [ 241.986127] should_fail.cold+0xa/0xf [ 241.989930] ? setup_fault_attr+0x200/0x200 [ 241.994237] ? lock_acquire+0x170/0x3c0 [ 241.998204] __should_failslab+0x115/0x180 [ 242.002442] should_failslab+0x5/0x10 [ 242.006239] kmem_cache_alloc+0x277/0x370 [ 242.010382] __d_alloc+0x2b/0xa10 [ 242.013844] d_alloc_pseudo+0x19/0x70 [ 242.017639] alloc_file_pseudo+0xc6/0x250 [ 242.021776] ? alloc_file+0x4d0/0x4d0 [ 242.025577] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 242.031208] ? shmem_get_inode+0x44c/0x8d0 [ 242.035432] __shmem_file_setup.part.0+0x102/0x2b0 [ 242.040349] shmem_file_setup+0x61/0x90 [ 242.044306] __se_sys_memfd_create+0x26b/0x440 [ 242.048873] ? memfd_file_seals_ptr+0x150/0x150 [ 242.053523] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.058872] ? trace_hardirqs_off_caller+0x6e/0x210 [ 242.063870] ? do_syscall_64+0x21/0x620 [ 242.067830] do_syscall_64+0xf9/0x620 [ 242.071616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.076786] RIP: 0033:0x465b09 [ 242.079961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.098844] RSP: 002b:00007fd7af408f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 242.106539] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 242.113792] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 242.121046] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 242.128297] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 242.135549] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:54 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:54 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 242.254617] erofs: unmounted for /dev/loop5 [ 242.278194] FAULT_INJECTION: forcing a failure. [ 242.278194] name failslab, interval 1, probability 0, space 0, times 0 [ 242.289604] CPU: 0 PID: 16331 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 [ 242.297623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.306986] Call Trace: [ 242.309586] dump_stack+0x1fc/0x2ef [ 242.313202] should_fail.cold+0xa/0xf [ 242.316992] ? setup_fault_attr+0x200/0x200 [ 242.321300] ? lock_acquire+0x170/0x3c0 [ 242.325265] __should_failslab+0x115/0x180 [ 242.329490] should_failslab+0x5/0x10 [ 242.333287] kmem_cache_alloc+0x277/0x370 [ 242.337458] __alloc_file+0x21/0x330 [ 242.341161] alloc_empty_file+0x6d/0x170 [ 242.345212] alloc_file+0x5e/0x4d0 [ 242.348745] alloc_file_pseudo+0x165/0x250 [ 242.352966] ? alloc_file+0x4d0/0x4d0 [ 242.356753] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 242.362364] ? shmem_get_inode+0x44c/0x8d0 [ 242.366590] __shmem_file_setup.part.0+0x102/0x2b0 [ 242.371508] shmem_file_setup+0x61/0x90 [ 242.375469] __se_sys_memfd_create+0x26b/0x440 [ 242.380038] ? memfd_file_seals_ptr+0x150/0x150 [ 242.384691] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.390047] ? trace_hardirqs_off_caller+0x6e/0x210 [ 242.395051] ? do_syscall_64+0x21/0x620 [ 242.399018] do_syscall_64+0xf9/0x620 [ 242.402827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.407998] RIP: 0033:0x465b09 [ 242.411176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.430063] RSP: 002b:00007fd7af408f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 242.437759] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 242.445015] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 242.452286] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 242.459541] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 242.466796] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 242.480160] erofs: read_super, device -> /dev/loop3 [ 242.485214] erofs: options -> acl,noacl, 05:48:54 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf8030000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 242.546966] erofs: read_super, device -> /dev/loop0 [ 242.562232] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 242.573344] erofs: unmounted for /dev/loop3 [ 242.580451] erofs: blksize 1 isn't supported on this platform [ 242.598175] erofs: read_super, device -> /dev/loop4 [ 242.603502] erofs: read_super, device -> /dev/loop1 [ 242.609377] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 242.612267] FAULT_INJECTION: forcing a failure. [ 242.612267] name failslab, interval 1, probability 0, space 0, times 0 [ 242.618023] erofs: options -> [ 242.633093] erofs: cannot find valid erofs superblock [ 242.635301] CPU: 0 PID: 16349 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 05:48:54 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 242.638912] FAULT_INJECTION: forcing a failure. [ 242.638912] name failslab, interval 1, probability 0, space 0, times 0 [ 242.646181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.646187] Call Trace: [ 242.646212] dump_stack+0x1fc/0x2ef [ 242.646231] should_fail.cold+0xa/0xf [ 242.646249] ? setup_fault_attr+0x200/0x200 [ 242.646263] ? lock_acquire+0x170/0x3c0 [ 242.646281] __should_failslab+0x115/0x180 [ 242.646298] should_failslab+0x5/0x10 [ 242.646312] kmem_cache_alloc_trace+0x284/0x380 [ 242.646331] apparmor_file_alloc_security+0x394/0xad0 [ 242.646346] ? apparmor_file_receive+0x160/0x160 [ 242.646363] ? __alloc_file+0x21/0x330 [ 242.646384] security_file_alloc+0x40/0x90 [ 242.646398] __alloc_file+0xc9/0x330 [ 242.646414] alloc_empty_file+0x6d/0x170 [ 242.646431] alloc_file+0x5e/0x4d0 [ 242.646451] alloc_file_pseudo+0x165/0x250 [ 242.646468] ? alloc_file+0x4d0/0x4d0 [ 242.646483] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 242.646500] ? shmem_get_inode+0x44c/0x8d0 [ 242.646522] __shmem_file_setup.part.0+0x102/0x2b0 [ 242.646541] shmem_file_setup+0x61/0x90 [ 242.646557] __se_sys_memfd_create+0x26b/0x440 [ 242.646572] ? memfd_file_seals_ptr+0x150/0x150 [ 242.646587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.646603] ? trace_hardirqs_off_caller+0x6e/0x210 [ 242.646619] ? do_syscall_64+0x21/0x620 [ 242.646636] do_syscall_64+0xf9/0x620 [ 242.646653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.646670] RIP: 0033:0x465b09 [ 242.646686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.646694] RSP: 002b:00007fd7af408f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 242.646707] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 242.646716] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 242.646724] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 242.646732] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 242.646741] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 242.859567] CPU: 0 PID: 16339 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 242.867546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.876881] Call Trace: [ 242.879459] dump_stack+0x1fc/0x2ef [ 242.883076] should_fail.cold+0xa/0xf [ 242.886858] ? setup_fault_attr+0x200/0x200 [ 242.891169] __should_failslab+0x115/0x180 [ 242.895869] should_failslab+0x5/0x10 [ 242.899653] kmem_cache_alloc+0x3f/0x370 [ 242.903706] ? mempool_alloc+0x350/0x350 [ 242.907798] mempool_alloc+0x146/0x350 [ 242.911668] ? mempool_resize+0x790/0x790 [ 242.915801] ? lock_downgrade+0x720/0x720 [ 242.919931] ? mark_held_locks+0xa6/0xf0 [ 242.923975] bio_alloc_bioset+0x389/0x5e0 [ 242.928106] ? __find_get_block+0x314/0xde0 [ 242.932459] ? bvec_alloc+0x2f0/0x2f0 [ 242.936244] ? __getblk_slow+0x6a3/0x9e0 [ 242.940290] submit_bh_wbc+0x141/0x760 [ 242.944167] __bread_gfp+0x14e/0x300 [ 242.947876] erofs_fill_super+0x207/0x12cc [ 242.952115] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 242.957386] ? vsprintf+0x30/0x30 [ 242.960830] ? wait_for_completion_io+0x10/0x10 [ 242.965503] ? set_blocksize+0x163/0x3f0 [ 242.969551] mount_bdev+0x2fc/0x3b0 [ 242.973160] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 242.978420] erofs_mount+0x8c/0xc0 [ 242.982115] ? erofs_kill_sb+0x20/0x20 [ 242.985986] ? alloc_pages_current+0x19b/0x2a0 [ 242.990551] ? __lockdep_init_map+0x100/0x5a0 [ 242.995044] mount_fs+0xa3/0x310 [ 242.998397] vfs_kern_mount.part.0+0x68/0x470 [ 243.002877] do_mount+0x113c/0x2f10 [ 243.006486] ? cmp_ex_sort+0xc0/0xc0 [ 243.010200] ? __do_page_fault+0x180/0xd60 [ 243.014435] ? copy_mount_string+0x40/0x40 [ 243.018662] ? memset+0x20/0x40 [ 243.021923] ? copy_mount_options+0x26f/0x380 [ 243.026432] ksys_mount+0xcf/0x130 [ 243.029958] __x64_sys_mount+0xba/0x150 [ 243.033914] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 243.038480] do_syscall_64+0xf9/0x620 [ 243.042264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.047441] RIP: 0033:0x46702a [ 243.050626] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 243.070385] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.078077] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 243.085326] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 243.092577] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 243.099828] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 243.107079] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 243.137662] erofs: blksize 1 isn't supported on this platform 05:48:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 243.223420] FAULT_INJECTION: forcing a failure. [ 243.223420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 243.237032] erofs: read_super, device -> /dev/loop5 [ 243.248578] CPU: 1 PID: 16363 Comm: syz-executor.2 Not tainted 4.19.172-syzkaller #0 [ 243.249070] erofs: options -> acl,noacl, [ 243.256492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:48:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:55 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 243.256506] Call Trace: [ 243.256532] dump_stack+0x1fc/0x2ef [ 243.256551] should_fail.cold+0xa/0xf [ 243.256567] ? lock_acquire+0x170/0x3c0 [ 243.256583] ? setup_fault_attr+0x200/0x200 [ 243.256615] __alloc_pages_nodemask+0x239/0x2890 [ 243.256633] ? __lock_acquire+0x6de/0x3ff0 [ 243.256652] ? __lock_acquire+0x6de/0x3ff0 [ 243.256673] ? __lock_acquire+0x6de/0x3ff0 [ 243.256688] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 243.256704] ? __lock_acquire+0x6de/0x3ff0 [ 243.256723] ? deref_stack_reg+0x134/0x1d0 [ 243.256740] ? mark_held_locks+0xf0/0xf0 [ 243.256758] ? mark_held_locks+0xf0/0xf0 [ 243.256775] ? unwind_next_frame+0x10a9/0x1c60 [ 243.256792] alloc_pages_vma+0xf2/0x780 [ 243.256813] shmem_alloc_page+0x11c/0x1f0 [ 243.256828] ? shmem_swapin+0x220/0x220 [ 243.256859] ? percpu_counter_add_batch+0x126/0x180 [ 243.256876] ? __vm_enough_memory+0x316/0x650 [ 243.256896] shmem_alloc_and_acct_page+0x15a/0x850 [ 243.256918] shmem_getpage_gfp+0x4e9/0x37f0 [ 243.256948] ? shmem_alloc_and_acct_page+0x850/0x850 [ 243.256965] ? mark_held_locks+0xa6/0xf0 [ 243.256979] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 243.256994] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 243.257014] shmem_write_begin+0xff/0x1e0 [ 243.257035] generic_perform_write+0x1f8/0x4d0 [ 243.257058] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 243.257072] ? current_time+0x1c0/0x1c0 [ 243.257090] ? lock_acquire+0x170/0x3c0 [ 243.257105] __generic_file_write_iter+0x24b/0x610 [ 243.257123] generic_file_write_iter+0x3f8/0x730 [ 243.257144] __vfs_write+0x51b/0x770 [ 243.257160] ? kernel_read+0x110/0x110 [ 243.257183] ? check_preemption_disabled+0x41/0x280 [ 243.257204] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 243.257222] vfs_write+0x1f3/0x540 [ 243.257241] __x64_sys_pwrite64+0x1f7/0x250 [ 243.257257] ? ksys_pwrite64+0x1a0/0x1a0 [ 243.257274] ? trace_hardirqs_off_caller+0x6e/0x210 [ 243.257289] ? do_syscall_64+0x21/0x620 [ 243.257306] do_syscall_64+0xf9/0x620 [ 243.257323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.257334] RIP: 0033:0x4191a7 [ 243.257349] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 243.257357] RSP: 002b:00007fd7af408f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 243.257371] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 243.257380] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 243.257388] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 243.257397] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 05:48:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf9030000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 243.257406] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 243.319958] erofs: read_super, device -> /dev/loop3 [ 243.342892] erofs: read_super, device -> /dev/loop0 [ 243.364126] erofs: options -> acl,noacl, [ 243.367583] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 243.381728] erofs: root inode @ nid 36 [ 243.404270] erofs: blksize 1 isn't supported on this platform [ 243.424570] erofs: mounted on /dev/loop5 with opts: acl. [ 243.553968] erofs: unmounted for /dev/loop3 [ 243.586157] erofs: read_super, device -> /dev/loop2 [ 243.597121] erofs: read_super, device -> /dev/loop4 [ 243.602233] erofs: options -> [ 243.605502] FAULT_INJECTION: forcing a failure. [ 243.605502] name failslab, interval 1, probability 0, space 0, times 0 [ 243.606158] erofs: read_super, device -> /dev/loop1 [ 243.619297] erofs: options -> 05:48:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 243.625301] erofs: cannot find valid erofs superblock [ 243.640752] CPU: 0 PID: 16371 Comm: syz-executor.4 Not tainted 4.19.172-syzkaller #0 [ 243.648664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.658022] Call Trace: [ 243.660627] dump_stack+0x1fc/0x2ef [ 243.664270] should_fail.cold+0xa/0xf [ 243.668091] ? setup_fault_attr+0x200/0x200 [ 243.672430] __should_failslab+0x115/0x180 [ 243.676085] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 243.676673] should_failslab+0x5/0x10 [ 243.676689] kmem_cache_alloc+0x3f/0x370 [ 243.676705] ? mempool_alloc+0x350/0x350 [ 243.687082] erofs: cannot find valid erofs superblock [ 243.688621] mempool_alloc+0x146/0x350 [ 243.688641] ? mempool_resize+0x790/0x790 [ 243.688663] ? lock_downgrade+0x720/0x720 [ 243.688680] ? mark_held_locks+0xa6/0xf0 [ 243.688699] bio_alloc_bioset+0x389/0x5e0 [ 243.688714] ? __find_get_block+0x314/0xde0 [ 243.688730] ? bvec_alloc+0x2f0/0x2f0 [ 243.688746] ? __getblk_slow+0x6a3/0x9e0 [ 243.688763] submit_bh_wbc+0x141/0x760 [ 243.688782] __bread_gfp+0x14e/0x300 [ 243.742064] erofs_fill_super+0x207/0x12cc [ 243.746315] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 243.751582] ? vsprintf+0x30/0x30 [ 243.755018] ? wait_for_completion_io+0x10/0x10 [ 243.759689] ? set_blocksize+0x163/0x3f0 [ 243.763743] mount_bdev+0x2fc/0x3b0 [ 243.767359] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 243.772624] erofs_mount+0x8c/0xc0 [ 243.776143] ? erofs_kill_sb+0x20/0x20 [ 243.780024] ? alloc_pages_current+0x19b/0x2a0 [ 243.784600] ? __lockdep_init_map+0x100/0x5a0 [ 243.789097] mount_fs+0xa3/0x310 [ 243.792470] vfs_kern_mount.part.0+0x68/0x470 [ 243.796951] do_mount+0x113c/0x2f10 [ 243.800568] ? cmp_ex_sort+0xc0/0xc0 [ 243.804275] ? __do_page_fault+0x180/0xd60 [ 243.808507] ? copy_mount_string+0x40/0x40 [ 243.812743] ? memset+0x20/0x40 [ 243.816006] ? copy_mount_options+0x26f/0x380 [ 243.820499] ksys_mount+0xcf/0x130 [ 243.824035] __x64_sys_mount+0xba/0x150 [ 243.828010] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 243.832586] do_syscall_64+0xf9/0x620 [ 243.836375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.841549] RIP: 0033:0x46702a [ 243.844727] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 243.863614] RSP: 002b:00007ff81a69dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.871316] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 243.878592] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff81a69e000 [ 243.885858] RBP: 00007ff81a69e040 R08: 00007ff81a69e040 R09: 0000000020000000 [ 243.893112] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 243.900364] R13: 0000000020000100 R14: 00007ff81a69e000 R15: 0000000020000140 [ 243.911596] erofs: unmounted for /dev/loop5 [ 243.912519] erofs: blksize 1 isn't supported on this platform [ 243.943680] erofs: read_super, device -> /dev/loop3 [ 243.952629] erofs: options -> acl,noacl, 05:48:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:56 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 244.095937] erofs: unmounted for /dev/loop3 [ 244.119663] erofs: read_super, device -> /dev/loop0 [ 244.124748] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 244.134997] erofs: blksize 1 isn't supported on this platform 05:48:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 244.169011] erofs: read_super, device -> /dev/loop5 [ 244.176185] erofs: options -> acl,noacl, [ 244.193337] erofs: read_super, device -> /dev/loop2 [ 244.202259] erofs: options -> [ 244.205788] erofs: root inode @ nid 36 [ 244.213039] erofs: mounted on /dev/loop2 with opts: . [ 244.233218] erofs: read_super, device -> /dev/loop1 [ 244.238285] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 244.266967] erofs: root inode @ nid 36 [ 244.276530] erofs: mounted on /dev/loop5 with opts: acl. [ 244.278445] erofs: read_super, device -> /dev/loop0 05:48:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 244.322768] erofs: read_super, device -> /dev/loop4 [ 244.332061] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 244.341475] erofs: unmounted for /dev/loop2 [ 244.351033] erofs: root inode @ nid 36 [ 244.351624] erofs: options -> [ 244.360629] erofs: blksize 1 isn't supported on this platform [ 244.364647] erofs: mounted on /dev/loop1 with opts: nouser_xattr. [ 244.366716] erofs: blksize 1 isn't supported on this platform [ 244.400628] erofs: read_super, device -> /dev/loop3 [ 244.418527] erofs: options -> acl,noacl, 05:48:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 244.474933] erofs: unmounted for /dev/loop5 [ 244.486350] erofs: unmounted for /dev/loop3 05:48:56 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 244.521839] erofs: unmounted for /dev/loop1 [ 244.634799] erofs: read_super, device -> /dev/loop2 [ 244.644112] erofs: options -> [ 244.654945] erofs: read_super, device -> /dev/loop4 [ 244.663796] erofs: options -> [ 244.677983] erofs: root inode @ nid 36 [ 244.678885] erofs: blksize 1 isn't supported on this platform [ 244.705677] FAULT_INJECTION: forcing a failure. [ 244.705677] name failslab, interval 1, probability 0, space 0, times 0 [ 244.717418] erofs: read_super, device -> /dev/loop3 [ 244.722786] erofs: options -> acl,noacl, [ 244.726458] erofs: mounted on /dev/loop2 with opts: . [ 244.731075] CPU: 0 PID: 16440 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 244.739954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.749309] Call Trace: [ 244.751899] dump_stack+0x1fc/0x2ef [ 244.755574] should_fail.cold+0xa/0xf [ 244.759373] ? setup_fault_attr+0x200/0x200 [ 244.763706] ? lock_acquire+0x170/0x3c0 [ 244.767680] __should_failslab+0x115/0x180 [ 244.771907] should_failslab+0x5/0x10 [ 244.775691] __kmalloc+0x2ab/0x3c0 [ 244.779212] ? __se_sys_memfd_create+0xf8/0x440 [ 244.783879] __se_sys_memfd_create+0xf8/0x440 [ 244.788372] ? memfd_file_seals_ptr+0x150/0x150 [ 244.793030] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.798424] ? trace_hardirqs_off_caller+0x6e/0x210 [ 244.803437] ? do_syscall_64+0x21/0x620 [ 244.807410] do_syscall_64+0xf9/0x620 [ 244.811202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.816397] RIP: 0033:0x465b09 [ 244.819586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.838483] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 244.846178] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 05:48:57 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 244.853585] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 244.860854] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 244.868121] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 244.875380] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 244.904660] erofs: read_super, device -> /dev/loop1 [ 244.910272] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 244.922057] erofs: root inode @ nid 36 [ 244.949108] erofs: read_super, device -> /dev/loop0 05:48:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 244.977001] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 244.993835] erofs: mounted on /dev/loop1 with opts: nouser_xattr. [ 244.996473] erofs: unmounted for /dev/loop3 [ 245.009327] FAULT_INJECTION: forcing a failure. [ 245.009327] name failslab, interval 1, probability 0, space 0, times 0 [ 245.020894] erofs: unmounted for /dev/loop2 [ 245.054268] CPU: 1 PID: 16459 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 245.062190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.071549] Call Trace: [ 245.074136] dump_stack+0x1fc/0x2ef [ 245.077751] should_fail.cold+0xa/0xf [ 245.081538] ? setup_fault_attr+0x200/0x200 [ 245.085844] ? lock_acquire+0x170/0x3c0 [ 245.089806] __should_failslab+0x115/0x180 [ 245.094027] should_failslab+0x5/0x10 [ 245.097813] kmem_cache_alloc+0x277/0x370 [ 245.101960] ? shmem_destroy_callback+0xb0/0xb0 [ 245.106627] shmem_alloc_inode+0x18/0x40 [ 245.110678] ? shmem_destroy_callback+0xb0/0xb0 [ 245.115332] alloc_inode+0x5d/0x180 [ 245.119012] new_inode+0x1d/0xf0 [ 245.122380] shmem_get_inode+0x96/0x8d0 [ 245.126352] __shmem_file_setup.part.0+0x7a/0x2b0 [ 245.131181] shmem_file_setup+0x61/0x90 [ 245.135202] __se_sys_memfd_create+0x26b/0x440 [ 245.139811] ? memfd_file_seals_ptr+0x150/0x150 [ 245.144472] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.149823] ? trace_hardirqs_off_caller+0x6e/0x210 [ 245.154828] ? do_syscall_64+0x21/0x620 [ 245.158789] do_syscall_64+0xf9/0x620 [ 245.162577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.167824] RIP: 0033:0x465b09 [ 245.171011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.189896] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.197589] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 05:48:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:48:57 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 245.204853] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 245.212273] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 245.219536] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 245.226801] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 245.241225] erofs: unmounted for /dev/loop1 [ 245.319411] erofs: read_super, device -> /dev/loop2 [ 245.337074] erofs: read_super, device -> /dev/loop4 [ 245.355588] erofs: read_super, device -> /dev/loop3 [ 245.361953] erofs: options -> 05:48:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 245.375395] erofs: options -> [ 245.378265] erofs: blksize 1 isn't supported on this platform [ 245.379864] erofs: root inode @ nid 36 [ 245.394735] erofs: options -> acl,noacl, [ 245.426104] erofs: mounted on /dev/loop2 with opts: . [ 245.434202] FAULT_INJECTION: forcing a failure. [ 245.434202] name failslab, interval 1, probability 0, space 0, times 0 [ 245.456657] CPU: 0 PID: 16484 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 245.464570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.473935] Call Trace: [ 245.476543] dump_stack+0x1fc/0x2ef [ 245.480189] should_fail.cold+0xa/0xf [ 245.483988] ? setup_fault_attr+0x200/0x200 [ 245.488296] ? lock_acquire+0x170/0x3c0 [ 245.492262] __should_failslab+0x115/0x180 [ 245.496498] should_failslab+0x5/0x10 [ 245.500303] kmem_cache_alloc+0x277/0x370 [ 245.504461] __d_alloc+0x2b/0xa10 [ 245.507935] d_alloc_pseudo+0x19/0x70 [ 245.511751] alloc_file_pseudo+0xc6/0x250 [ 245.515916] ? alloc_file+0x4d0/0x4d0 [ 245.519729] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 245.525365] ? shmem_get_inode+0x44c/0x8d0 [ 245.527363] erofs: read_super, device -> /dev/loop0 [ 245.529613] __shmem_file_setup.part.0+0x102/0x2b0 [ 245.529636] shmem_file_setup+0x61/0x90 [ 245.529652] __se_sys_memfd_create+0x26b/0x440 [ 245.529669] ? memfd_file_seals_ptr+0x150/0x150 [ 245.540598] erofs: read_super, device -> /dev/loop1 [ 245.543557] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.543578] ? trace_hardirqs_off_caller+0x6e/0x210 [ 245.543594] ? do_syscall_64+0x21/0x620 [ 245.543616] do_syscall_64+0xf9/0x620 [ 245.567100] erofs: read_super, device -> /dev/loop4 [ 245.568221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.568235] RIP: 0033:0x465b09 [ 245.568250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.568262] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.580946] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 245.581017] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 245.610131] erofs: options -> [ 245.615962] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 245.615971] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 245.615978] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 245.615986] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 245.657204] erofs: unmounted for /dev/loop3 05:48:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:57 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 245.672360] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 245.684497] erofs: root inode @ nid 36 [ 245.695540] erofs: unmounted for /dev/loop2 [ 245.707155] erofs: blksize 1 isn't supported on this platform [ 245.707689] erofs: mounted on /dev/loop1 with opts: nouser_xattr. 05:48:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 245.788850] FAULT_INJECTION: forcing a failure. [ 245.788850] name failslab, interval 1, probability 0, space 0, times 0 [ 245.801425] CPU: 1 PID: 16500 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 245.809330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.818689] Call Trace: [ 245.821284] dump_stack+0x1fc/0x2ef [ 245.824903] should_fail.cold+0xa/0xf [ 245.828694] ? setup_fault_attr+0x200/0x200 [ 245.833008] ? lock_acquire+0x170/0x3c0 [ 245.836973] __should_failslab+0x115/0x180 [ 245.841213] should_failslab+0x5/0x10 [ 245.845010] kmem_cache_alloc+0x277/0x370 [ 245.849173] __alloc_file+0x21/0x330 [ 245.852881] alloc_empty_file+0x6d/0x170 [ 245.856930] alloc_file+0x5e/0x4d0 [ 245.860460] alloc_file_pseudo+0x165/0x250 [ 245.864683] ? alloc_file+0x4d0/0x4d0 [ 245.868470] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 245.874081] ? shmem_get_inode+0x44c/0x8d0 [ 245.878310] __shmem_file_setup.part.0+0x102/0x2b0 [ 245.883229] shmem_file_setup+0x61/0x90 [ 245.887188] __se_sys_memfd_create+0x26b/0x440 [ 245.891756] ? memfd_file_seals_ptr+0x150/0x150 [ 245.896414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.901764] ? trace_hardirqs_off_caller+0x6e/0x210 [ 245.906768] ? do_syscall_64+0x21/0x620 [ 245.910753] do_syscall_64+0xf9/0x620 [ 245.914542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.919717] RIP: 0033:0x465b09 05:48:58 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 245.922898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.941789] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 245.949484] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 245.956757] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 245.964011] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 245.971263] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 245.978532] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:48:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) [ 246.044863] erofs: unmounted for /dev/loop1 [ 246.054520] erofs: read_super, device -> /dev/loop2 [ 246.059577] erofs: options -> [ 246.063367] erofs: root inode @ nid 36 [ 246.067315] erofs: mounted on /dev/loop2 with opts: . [ 246.117752] erofs: read_super, device -> /dev/loop3 [ 246.132874] erofs: options -> acl,noacl, 05:48:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 246.198832] FAULT_INJECTION: forcing a failure. [ 246.198832] name failslab, interval 1, probability 0, space 0, times 0 [ 246.210195] erofs: unmounted for /dev/loop2 [ 246.212042] CPU: 0 PID: 16518 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 246.222417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.231776] Call Trace: [ 246.234381] dump_stack+0x1fc/0x2ef [ 246.238024] should_fail.cold+0xa/0xf [ 246.241840] ? setup_fault_attr+0x200/0x200 [ 246.246174] ? lock_acquire+0x170/0x3c0 [ 246.250167] __should_failslab+0x115/0x180 [ 246.254416] should_failslab+0x5/0x10 [ 246.258225] kmem_cache_alloc_trace+0x284/0x380 [ 246.262910] apparmor_file_alloc_security+0x394/0xad0 [ 246.268128] ? apparmor_file_receive+0x160/0x160 [ 246.272899] ? __alloc_file+0x21/0x330 [ 246.276804] security_file_alloc+0x40/0x90 [ 246.281057] __alloc_file+0xc9/0x330 [ 246.284782] alloc_empty_file+0x6d/0x170 [ 246.288855] alloc_file+0x5e/0x4d0 [ 246.292414] alloc_file_pseudo+0x165/0x250 [ 246.296671] ? alloc_file+0x4d0/0x4d0 [ 246.300483] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 246.306121] ? shmem_get_inode+0x44c/0x8d0 [ 246.310376] __shmem_file_setup.part.0+0x102/0x2b0 [ 246.315355] shmem_file_setup+0x61/0x90 [ 246.319356] __se_sys_memfd_create+0x26b/0x440 [ 246.323958] ? memfd_file_seals_ptr+0x150/0x150 [ 246.328644] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 246.334021] ? trace_hardirqs_off_caller+0x6e/0x210 [ 246.339043] ? do_syscall_64+0x21/0x620 [ 246.343011] do_syscall_64+0xf9/0x620 [ 246.346803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.351983] RIP: 0033:0x465b09 [ 246.355164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.374054] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.381764] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 246.389017] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:48:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:58 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 246.396272] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 246.403529] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 246.410782] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 246.418940] erofs: read_super, device -> /dev/loop4 [ 246.425026] erofs: unmounted for /dev/loop3 [ 246.431683] erofs: options -> [ 246.435087] erofs: blksize 1 isn't supported on this platform [ 246.492214] erofs: read_super, device -> /dev/loop0 [ 246.497457] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, 05:48:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 246.590001] FAULT_INJECTION: forcing a failure. [ 246.590001] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.604539] erofs: read_super, device -> /dev/loop3 [ 246.619413] erofs: options -> acl,noacl, [ 246.629086] CPU: 0 PID: 16535 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 246.637004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.646373] Call Trace: [ 246.648971] dump_stack+0x1fc/0x2ef [ 246.652598] should_fail.cold+0xa/0xf [ 246.656399] ? lock_acquire+0x170/0x3c0 [ 246.660415] ? setup_fault_attr+0x200/0x200 [ 246.664747] __alloc_pages_nodemask+0x239/0x2890 [ 246.669517] ? __lock_acquire+0x6de/0x3ff0 [ 246.673757] ? static_obj+0x50/0x50 [ 246.677386] ? __lock_acquire+0x6de/0x3ff0 [ 246.681626] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 246.686468] ? __lock_acquire+0x6de/0x3ff0 [ 246.690704] ? deref_stack_reg+0x134/0x1d0 [ 246.694937] ? mark_held_locks+0xf0/0xf0 [ 246.698986] ? mark_held_locks+0xf0/0xf0 [ 246.703046] ? unwind_next_frame+0x10a9/0x1c60 [ 246.707621] alloc_pages_vma+0xf2/0x780 [ 246.711584] shmem_alloc_page+0x11c/0x1f0 [ 246.715718] ? shmem_swapin+0x220/0x220 [ 246.719686] ? percpu_counter_add_batch+0x126/0x180 [ 246.724702] ? __vm_enough_memory+0x316/0x650 [ 246.729194] shmem_alloc_and_acct_page+0x15a/0x850 [ 246.734113] shmem_getpage_gfp+0x4e9/0x37f0 [ 246.738430] ? shmem_alloc_and_acct_page+0x850/0x850 [ 246.743539] ? mark_held_locks+0xa6/0xf0 [ 246.747596] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 246.752772] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 246.758011] shmem_write_begin+0xff/0x1e0 [ 246.762164] generic_perform_write+0x1f8/0x4d0 [ 246.766762] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 246.771429] ? current_time+0x1c0/0x1c0 [ 246.775390] ? lock_acquire+0x170/0x3c0 [ 246.779351] __generic_file_write_iter+0x24b/0x610 [ 246.784286] generic_file_write_iter+0x3f8/0x730 [ 246.789042] __vfs_write+0x51b/0x770 [ 246.792743] ? kernel_read+0x110/0x110 [ 246.796621] ? check_preemption_disabled+0x41/0x280 [ 246.801638] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 246.806659] vfs_write+0x1f3/0x540 [ 246.810197] __x64_sys_pwrite64+0x1f7/0x250 [ 246.814516] ? ksys_pwrite64+0x1a0/0x1a0 [ 246.818577] ? trace_hardirqs_off_caller+0x6e/0x210 [ 246.823593] ? do_syscall_64+0x21/0x620 [ 246.827568] do_syscall_64+0xf9/0x620 [ 246.831357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.836539] RIP: 0033:0x4191a7 [ 246.839739] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 246.858680] RSP: 002b:00007f9d64cc6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 246.866390] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 246.873664] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 246.880922] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 246.888184] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 246.895443] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 246.926257] erofs: read_super, device -> /dev/loop2 [ 246.931321] erofs: options -> [ 246.947620] erofs: root inode @ nid 36 [ 246.958495] erofs: mounted on /dev/loop2 with opts: . [ 246.966678] erofs: read_super, device -> /dev/loop4 [ 246.967872] erofs: read_super, device -> /dev/loop5 [ 246.971918] erofs: options -> [ 246.980411] erofs: blksize 1 isn't supported on this platform [ 246.995253] erofs: options -> acl,noacl, [ 246.999706] erofs: cannot find valid erofs superblock 05:48:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, 0x0) 05:48:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 247.123717] erofs: unmounted for /dev/loop3 [ 247.145274] erofs: read_super, device -> /dev/loop0 05:48:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:48:59 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 247.169841] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 247.188521] erofs: unmounted for /dev/loop2 [ 247.222367] FAULT_INJECTION: forcing a failure. [ 247.222367] name failslab, interval 1, probability 0, space 0, times 0 [ 247.234339] CPU: 0 PID: 16568 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 247.242237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.251581] Call Trace: [ 247.254176] dump_stack+0x1fc/0x2ef [ 247.257848] should_fail.cold+0xa/0xf [ 247.261640] ? setup_fault_attr+0x200/0x200 [ 247.265969] ? lock_acquire+0x170/0x3c0 [ 247.269932] __should_failslab+0x115/0x180 [ 247.274165] should_failslab+0x5/0x10 [ 247.277961] kmem_cache_alloc+0x277/0x370 [ 247.282106] getname_flags+0xce/0x590 [ 247.285919] do_sys_open+0x26c/0x520 [ 247.289622] ? filp_open+0x70/0x70 [ 247.293162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.298522] ? trace_hardirqs_off_caller+0x6e/0x210 [ 247.303524] ? do_syscall_64+0x21/0x620 [ 247.307483] do_syscall_64+0xf9/0x620 [ 247.311271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.316452] RIP: 0033:0x4190f4 [ 247.319641] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 247.338550] RSP: 002b:00007f9d64cc6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 247.346244] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 247.353509] RDX: 0000000000000002 RSI: 00007f9d64cc7000 RDI: 00000000ffffff9c [ 247.360770] RBP: 00007f9d64cc7000 R08: 0000000000000000 R09: ffffffffffffffff 05:48:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 247.368028] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 247.375292] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 247.404165] erofs: read_super, device -> /dev/loop4 [ 247.409244] erofs: options -> 05:48:59 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:48:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) [ 247.420451] erofs: unmounted for /dev/loop0 [ 247.430942] erofs: blksize 1 isn't supported on this platform [ 247.519968] FAULT_INJECTION: forcing a failure. [ 247.519968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.531815] CPU: 1 PID: 16585 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 247.539691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.549036] Call Trace: [ 247.551624] dump_stack+0x1fc/0x2ef [ 247.555317] should_fail.cold+0xa/0xf [ 247.559114] ? setup_fault_attr+0x200/0x200 [ 247.563427] ? do_writepages+0x290/0x290 [ 247.567476] ? unlock_page+0x13d/0x230 [ 247.571353] __alloc_pages_nodemask+0x239/0x2890 [ 247.576108] ? lock_downgrade+0x720/0x720 [ 247.580256] ? check_preemption_disabled+0x41/0x280 [ 247.585270] ? __lock_acquire+0x6de/0x3ff0 [ 247.589493] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 247.594318] ? lock_downgrade+0x720/0x720 [ 247.598469] ? lock_acquire+0x170/0x3c0 [ 247.602432] ? up_write+0x18/0x150 [ 247.605965] ? generic_file_write_iter+0x381/0x730 [ 247.610891] ? iov_iter_init+0xb8/0x1d0 [ 247.614870] cache_grow_begin+0xa4/0x8a0 [ 247.618928] ? setup_fault_attr+0x200/0x200 [ 247.623278] ? lock_acquire+0x170/0x3c0 [ 247.627238] cache_alloc_refill+0x273/0x340 [ 247.631596] kmem_cache_alloc+0x346/0x370 [ 247.635743] getname_flags+0xce/0x590 [ 247.639554] do_sys_open+0x26c/0x520 [ 247.643255] ? filp_open+0x70/0x70 [ 247.646783] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.652138] ? trace_hardirqs_off_caller+0x6e/0x210 [ 247.657160] ? do_syscall_64+0x21/0x620 [ 247.661127] do_syscall_64+0xf9/0x620 [ 247.664931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.670134] RIP: 0033:0x4190f4 [ 247.673310] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 247.692195] RSP: 002b:00007f9d64cc6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 247.699885] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 247.707138] RDX: 0000000000000002 RSI: 00007f9d64cc7000 RDI: 00000000ffffff9c [ 247.714392] RBP: 00007f9d64cc7000 R08: 0000000000000000 R09: ffffffffffffffff [ 247.721678] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 247.728931] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 247.740644] erofs: read_super, device -> /dev/loop3 [ 247.745891] erofs: options -> acl,noacl, [ 247.746426] erofs: read_super, device -> /dev/loop2 [ 247.787452] erofs: options -> 05:49:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 247.811824] erofs: root inode @ nid 36 [ 247.818176] erofs: mounted on /dev/loop2 with opts: . [ 247.819098] erofs: read_super, device -> /dev/loop5 [ 247.836292] erofs: read_super, device -> /dev/loop4 [ 247.845233] erofs: options -> acl,noacl, [ 247.849590] erofs: options -> [ 247.860095] erofs: unmounted for /dev/loop2 [ 247.865253] erofs: unmounted for /dev/loop3 [ 247.866236] erofs: root inode @ nid 36 [ 247.879567] erofs: read_super, device -> /dev/loop1 [ 247.884045] erofs: blksize 1 isn't supported on this platform [ 247.886358] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 247.906180] erofs: mounted on /dev/loop5 with opts: acl. 05:49:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) 05:49:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 247.935989] erofs: read_super, device -> /dev/loop0 [ 247.941031] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 247.960380] erofs: unmounted for /dev/loop1 05:49:00 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 248.020133] erofs: unmounted for /dev/loop5 05:49:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 248.157041] erofs: read_super, device -> /dev/loop4 [ 248.162089] erofs: options -> [ 248.177743] erofs: blksize 1 isn't supported on this platform [ 248.198430] erofs: read_super, device -> /dev/loop2 [ 248.220263] erofs: read_super, device -> /dev/loop3 [ 248.227521] erofs: options -> acl,noacl, [ 248.232942] erofs: options -> [ 248.234853] FAULT_INJECTION: forcing a failure. [ 248.234853] name failslab, interval 1, probability 0, space 0, times 0 [ 248.237657] erofs: root inode @ nid 36 [ 248.252022] erofs: mounted on /dev/loop2 with opts: . [ 248.267086] CPU: 1 PID: 16620 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 248.275005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.284369] Call Trace: [ 248.286977] dump_stack+0x1fc/0x2ef [ 248.290620] should_fail.cold+0xa/0xf [ 248.294434] ? setup_fault_attr+0x200/0x200 [ 248.298777] ? lock_acquire+0x170/0x3c0 [ 248.302772] __should_failslab+0x115/0x180 [ 248.307020] should_failslab+0x5/0x10 [ 248.308360] erofs: read_super, device -> /dev/loop1 [ 248.310830] kmem_cache_alloc+0x277/0x370 [ 248.319982] __alloc_file+0x21/0x330 [ 248.323722] alloc_empty_file+0x6d/0x170 [ 248.327793] path_openat+0xe9/0x2df0 [ 248.331513] ? __lock_acquire+0x6de/0x3ff0 [ 248.335768] ? path_lookupat+0x8d0/0x8d0 [ 248.339844] ? mark_held_locks+0xf0/0xf0 [ 248.343921] do_filp_open+0x18c/0x3f0 [ 248.346102] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 248.347722] ? may_open_dev+0xf0/0xf0 [ 248.347740] ? __alloc_fd+0x28d/0x570 [ 248.347760] ? lock_downgrade+0x720/0x720 [ 248.366311] ? lock_acquire+0x170/0x3c0 [ 248.370294] ? __alloc_fd+0x34/0x570 [ 248.374025] ? do_raw_spin_unlock+0x171/0x230 [ 248.378530] ? _raw_spin_unlock+0x29/0x40 [ 248.382688] ? __alloc_fd+0x28d/0x570 [ 248.386503] do_sys_open+0x3b3/0x520 [ 248.390231] ? filp_open+0x70/0x70 [ 248.393787] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.399168] ? trace_hardirqs_off_caller+0x6e/0x210 [ 248.404225] ? do_syscall_64+0x21/0x620 [ 248.408217] do_syscall_64+0xf9/0x620 [ 248.412032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.417226] RIP: 0033:0x4190f4 [ 248.420427] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 248.439341] RSP: 002b:00007f9d64cc6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 248.447065] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 248.454349] RDX: 0000000000000002 RSI: 00007f9d64cc7000 RDI: 00000000ffffff9c [ 248.461630] RBP: 00007f9d64cc7000 R08: 0000000000000000 R09: ffffffffffffffff 05:49:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) [ 248.468914] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 248.476205] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 248.495135] erofs: unmounted for /dev/loop3 [ 248.499773] erofs: unmounted for /dev/loop2 [ 248.514790] erofs: read_super, device -> /dev/loop0 05:49:00 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 248.519847] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 248.531260] erofs: unmounted for /dev/loop1 05:49:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 248.568576] erofs: read_super, device -> /dev/loop4 [ 248.574094] erofs: options -> [ 248.577469] erofs: blksize 1 isn't supported on this platform [ 248.740462] FAULT_INJECTION: forcing a failure. [ 248.740462] name failslab, interval 1, probability 0, space 0, times 0 [ 248.782048] CPU: 1 PID: 16642 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 248.789965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.799319] Call Trace: [ 248.801911] dump_stack+0x1fc/0x2ef [ 248.805527] should_fail.cold+0xa/0xf [ 248.809451] ? setup_fault_attr+0x200/0x200 [ 248.813771] ? lock_acquire+0x170/0x3c0 [ 248.817746] __should_failslab+0x115/0x180 [ 248.821966] should_failslab+0x5/0x10 [ 248.825754] kmem_cache_alloc_trace+0x284/0x380 [ 248.830419] apparmor_file_alloc_security+0x394/0xad0 [ 248.835598] ? apparmor_file_receive+0x160/0x160 [ 248.840352] ? __alloc_file+0x21/0x330 [ 248.844237] security_file_alloc+0x40/0x90 [ 248.848456] __alloc_file+0xc9/0x330 [ 248.852152] alloc_empty_file+0x6d/0x170 [ 248.856202] path_openat+0xe9/0x2df0 [ 248.859904] ? __lock_acquire+0x6de/0x3ff0 [ 248.864181] ? path_lookupat+0x8d0/0x8d0 [ 248.868228] ? mark_held_locks+0xf0/0xf0 [ 248.872279] do_filp_open+0x18c/0x3f0 [ 248.876071] ? may_open_dev+0xf0/0xf0 [ 248.879861] ? __alloc_fd+0x28d/0x570 [ 248.883664] ? lock_downgrade+0x720/0x720 [ 248.887877] ? lock_acquire+0x170/0x3c0 [ 248.891883] ? __alloc_fd+0x34/0x570 [ 248.895587] ? do_raw_spin_unlock+0x171/0x230 [ 248.900165] ? _raw_spin_unlock+0x29/0x40 [ 248.904299] ? __alloc_fd+0x28d/0x570 [ 248.908093] do_sys_open+0x3b3/0x520 [ 248.911791] ? filp_open+0x70/0x70 [ 248.915319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.920670] ? trace_hardirqs_off_caller+0x6e/0x210 [ 248.925671] ? do_syscall_64+0x21/0x620 [ 248.929631] do_syscall_64+0xf9/0x620 [ 248.933417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.938595] RIP: 0033:0x4190f4 [ 248.941772] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 248.960657] RSP: 002b:00007f9d64cc6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 248.968350] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 248.975607] RDX: 0000000000000002 RSI: 00007f9d64cc7000 RDI: 00000000ffffff9c 05:49:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:01 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 248.982861] RBP: 00007f9d64cc7000 R08: 0000000000000000 R09: ffffffffffffffff [ 248.990114] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 248.997397] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 249.046420] erofs: read_super, device -> /dev/loop1 [ 249.049060] erofs: read_super, device -> /dev/loop0 [ 249.051475] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 249.070698] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 249.082150] erofs: read_super, device -> /dev/loop3 [ 249.093445] erofs: read_super, device -> /dev/loop2 [ 249.111274] erofs: options -> acl,noacl, [ 249.117068] erofs: options -> [ 249.120636] erofs: root inode @ nid 36 05:49:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) 05:49:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:49:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 249.149996] erofs: mounted on /dev/loop2 with opts: . [ 249.167841] erofs: unmounted for /dev/loop1 [ 249.181256] erofs: unmounted for /dev/loop3 [ 249.228126] FAULT_INJECTION: forcing a failure. [ 249.228126] name failslab, interval 1, probability 0, space 0, times 0 [ 249.242051] CPU: 1 PID: 16660 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 249.249956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.259308] Call Trace: [ 249.261893] dump_stack+0x1fc/0x2ef [ 249.265512] should_fail.cold+0xa/0xf [ 249.269313] ? setup_fault_attr+0x200/0x200 [ 249.273618] ? lock_acquire+0x170/0x3c0 [ 249.277592] __should_failslab+0x115/0x180 [ 249.281813] should_failslab+0x5/0x10 [ 249.285597] kmem_cache_alloc_trace+0x284/0x380 [ 249.290252] ? loop_info64_to_compat+0x5e0/0x5e0 [ 249.295011] __kthread_create_on_node+0xd2/0x410 [ 249.299754] ? kthread_parkme+0xa0/0xa0 [ 249.303724] ? lo_ioctl+0x1bb/0x20e0 [ 249.307439] ? __mutex_lock+0x3a8/0x1260 [ 249.311488] ? lock_downgrade+0x720/0x720 [ 249.315622] ? loop_info64_to_compat+0x5e0/0x5e0 [ 249.320364] kthread_create_on_node+0xbb/0xf0 [ 249.324844] ? __kthread_create_on_node+0x410/0x410 [ 249.329845] ? __fget+0x356/0x510 [ 249.333301] ? do_dup2+0x450/0x450 [ 249.336827] ? __lockdep_init_map+0x100/0x5a0 [ 249.341304] ? __lockdep_init_map+0x100/0x5a0 [ 249.345804] lo_ioctl+0xae5/0x20e0 [ 249.349335] ? loop_set_status64+0x110/0x110 [ 249.355737] blkdev_ioctl+0x5cb/0x1a80 [ 249.359612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.364970] ? blkpg_ioctl+0x9d0/0x9d0 [ 249.368855] ? mark_held_locks+0xf0/0xf0 [ 249.372899] ? mark_held_locks+0xf0/0xf0 [ 249.376949] ? debug_check_no_obj_freed+0x201/0x490 [ 249.381950] ? lock_downgrade+0x720/0x720 [ 249.386094] block_ioctl+0xe9/0x130 [ 249.389711] ? blkdev_fallocate+0x3f0/0x3f0 [ 249.394019] do_vfs_ioctl+0xcdb/0x12e0 [ 249.397895] ? lock_downgrade+0x720/0x720 [ 249.402024] ? check_preemption_disabled+0x41/0x280 [ 249.407023] ? ioctl_preallocate+0x200/0x200 [ 249.411416] ? __fget+0x356/0x510 [ 249.414881] ? do_dup2+0x450/0x450 [ 249.418413] ? do_sys_open+0x2bf/0x520 [ 249.422309] ksys_ioctl+0x9b/0xc0 [ 249.425868] __x64_sys_ioctl+0x6f/0xb0 [ 249.429745] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 249.434325] do_syscall_64+0xf9/0x620 [ 249.438172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.443348] RIP: 0033:0x4658c7 [ 249.446528] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.465423] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.473116] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 249.480366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 249.487618] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 249.494870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 249.502121] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 249.586081] erofs: read_super, device -> /dev/loop1 [ 249.587730] erofs: read_super, device -> /dev/loop0 [ 249.591133] erofs: options -> nouser_xattr,acl,noacl, [ 249.597613] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 249.624303] erofs: read_super, device -> /dev/loop4 [ 249.629738] erofs: options -> 05:49:01 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 249.633252] erofs: read_super, device -> /dev/loop3 [ 249.641317] erofs: options -> acl,noacl, [ 249.651498] erofs: cannot find valid erofs superblock [ 249.674750] erofs: blksize 1 isn't supported on this platform 05:49:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) [ 249.683025] erofs: unmounted for /dev/loop1 [ 249.691774] erofs: unmounted for /dev/loop2 [ 249.697623] erofs: unmounted for /dev/loop3 [ 249.726232] FAULT_INJECTION: forcing a failure. [ 249.726232] name failslab, interval 1, probability 0, space 0, times 0 [ 249.737773] CPU: 1 PID: 16683 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 249.745667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.755099] Call Trace: [ 249.757683] dump_stack+0x1fc/0x2ef [ 249.761299] should_fail.cold+0xa/0xf [ 249.765091] ? setup_fault_attr+0x200/0x200 [ 249.769401] ? lock_acquire+0x170/0x3c0 [ 249.773376] __should_failslab+0x115/0x180 [ 249.777603] should_failslab+0x5/0x10 [ 249.781649] kmem_cache_alloc+0x277/0x370 [ 249.785782] __kernfs_new_node+0xd2/0x680 [ 249.790086] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 249.794827] ? __cpu_to_node+0x7b/0xa0 [ 249.798710] ? account_entity_enqueue+0x2e5/0x440 [ 249.803548] ? mark_held_locks+0xf0/0xf0 [ 249.807599] ? enqueue_entity+0xf86/0x3850 [ 249.811818] ? set_user_nice.part.0+0x3b9/0xab0 [ 249.816477] kernfs_create_dir_ns+0x9e/0x230 [ 249.820873] internal_create_group+0x1c1/0xb20 [ 249.825460] ? sysfs_remove_link_from_group+0x70/0x70 [ 249.830660] ? lock_downgrade+0x720/0x720 [ 249.834804] lo_ioctl+0xf7c/0x20e0 [ 249.838335] ? loop_set_status64+0x110/0x110 [ 249.842788] blkdev_ioctl+0x5cb/0x1a80 [ 249.846676] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.852052] ? blkpg_ioctl+0x9d0/0x9d0 [ 249.855936] ? mark_held_locks+0xf0/0xf0 [ 249.859986] ? mark_held_locks+0xf0/0xf0 [ 249.864036] ? debug_check_no_obj_freed+0x201/0x490 [ 249.869038] ? lock_downgrade+0x720/0x720 [ 249.873173] block_ioctl+0xe9/0x130 [ 249.876783] ? blkdev_fallocate+0x3f0/0x3f0 [ 249.881091] do_vfs_ioctl+0xcdb/0x12e0 [ 249.884962] ? lock_downgrade+0x720/0x720 [ 249.889219] ? check_preemption_disabled+0x41/0x280 [ 249.894229] ? ioctl_preallocate+0x200/0x200 [ 249.898627] ? __fget+0x356/0x510 [ 249.902067] ? do_dup2+0x450/0x450 [ 249.905589] ? do_sys_open+0x2bf/0x520 [ 249.909469] ksys_ioctl+0x9b/0xc0 [ 249.912933] __x64_sys_ioctl+0x6f/0xb0 [ 249.916817] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 249.921383] do_syscall_64+0xf9/0x620 [ 249.925174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.930346] RIP: 0033:0x4658c7 [ 249.933578] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.952511] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.960203] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 249.967458] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 249.974718] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 249.981979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 249.989230] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 250.110692] erofs: read_super, device -> /dev/loop5 [ 250.121489] erofs: read_super, device -> /dev/loop1 [ 250.124624] erofs: options -> acl,noacl, [ 250.139701] erofs: root inode @ nid 36 [ 250.140245] erofs: options -> nouser_xattr,acl, [ 250.147523] erofs: mounted on /dev/loop5 with opts: acl. [ 250.160487] erofs: read_super, device -> /dev/loop0 [ 250.166701] erofs: read_super, device -> /dev/loop4 [ 250.172134] erofs: options -> [ 250.173912] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 250.186316] erofs: cannot find valid erofs superblock [ 250.199578] erofs: blksize 1 isn't supported on this platform 05:49:02 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 250.211118] erofs: read_super, device -> /dev/loop3 [ 250.218932] erofs: options -> acl,noacl, [ 250.223540] erofs: unmounted for /dev/loop5 05:49:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 250.322494] erofs: unmounted for /dev/loop1 [ 250.351260] erofs: read_super, device -> /dev/loop2 05:49:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:49:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 250.372293] erofs: options -> [ 250.387285] erofs: root inode @ nid 36 [ 250.400353] erofs: unmounted for /dev/loop3 [ 250.405641] erofs: mounted on /dev/loop2 with opts: . [ 250.445283] FAULT_INJECTION: forcing a failure. [ 250.445283] name failslab, interval 1, probability 0, space 0, times 0 [ 250.463011] CPU: 0 PID: 16720 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 250.470942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.480297] Call Trace: [ 250.482946] dump_stack+0x1fc/0x2ef [ 250.486560] should_fail.cold+0xa/0xf [ 250.490345] ? setup_fault_attr+0x200/0x200 [ 250.494656] ? lock_acquire+0x170/0x3c0 [ 250.498618] __should_failslab+0x115/0x180 [ 250.502839] should_failslab+0x5/0x10 [ 250.506631] kmem_cache_alloc+0x277/0x370 [ 250.510774] __kernfs_new_node+0xd2/0x680 [ 250.514912] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 250.519654] ? kernfs_activate+0x2c/0x1d0 [ 250.523787] ? lock_downgrade+0x720/0x720 [ 250.527924] ? kernfs_add_one+0x51/0x4c0 [ 250.531969] ? __mutex_add_waiter+0x160/0x160 [ 250.536480] ? __mutex_unlock_slowpath+0xea/0x610 [ 250.541322] kernfs_new_node+0x92/0x120 [ 250.545296] __kernfs_create_file+0x51/0x340 [ 250.549713] sysfs_add_file_mode_ns+0x226/0x540 [ 250.554382] internal_create_group+0x355/0xb20 [ 250.558952] ? sysfs_remove_link_from_group+0x70/0x70 [ 250.564138] ? lock_downgrade+0x720/0x720 [ 250.568286] lo_ioctl+0xf7c/0x20e0 [ 250.571815] ? loop_set_status64+0x110/0x110 [ 250.576226] blkdev_ioctl+0x5cb/0x1a80 [ 250.580109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.585470] ? blkpg_ioctl+0x9d0/0x9d0 [ 250.589407] ? mark_held_locks+0xf0/0xf0 [ 250.593460] ? mark_held_locks+0xf0/0xf0 [ 250.597524] ? debug_check_no_obj_freed+0x201/0x490 [ 250.602537] ? lock_downgrade+0x720/0x720 [ 250.606678] block_ioctl+0xe9/0x130 [ 250.610289] ? blkdev_fallocate+0x3f0/0x3f0 [ 250.614597] do_vfs_ioctl+0xcdb/0x12e0 [ 250.618472] ? lock_downgrade+0x720/0x720 [ 250.622603] ? check_preemption_disabled+0x41/0x280 [ 250.627603] ? ioctl_preallocate+0x200/0x200 [ 250.631997] ? __fget+0x356/0x510 [ 250.635449] ? do_dup2+0x450/0x450 [ 250.638999] ? do_sys_open+0x2bf/0x520 [ 250.642886] ksys_ioctl+0x9b/0xc0 [ 250.646325] __x64_sys_ioctl+0x6f/0xb0 [ 250.650201] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 250.654798] do_syscall_64+0xf9/0x620 [ 250.658588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.663782] RIP: 0033:0x4658c7 [ 250.666958] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.685843] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 250.693537] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 250.700792] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 250.708047] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 250.715299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 250.722550] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 250.772997] erofs: read_super, device -> /dev/loop0 [ 250.787555] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 250.795444] erofs: read_super, device -> /dev/loop1 [ 250.796006] erofs: read_super, device -> /dev/loop5 [ 250.801725] erofs: options -> nouser_xattr,acl, [ 250.806484] erofs: read_super, device -> /dev/loop4 05:49:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) [ 250.833029] erofs: unmounted for /dev/loop2 [ 250.836436] erofs: options -> [ 250.840819] erofs: options -> acl,noacl, [ 250.847089] erofs: blksize 1 isn't supported on this platform [ 250.853445] erofs: cannot find valid erofs superblock [ 250.862151] erofs: root inode @ nid 36 [ 250.867270] erofs: mounted on /dev/loop5 with opts: acl. [ 250.893278] erofs: unmounted for /dev/loop1 [ 251.002561] erofs: read_super, device -> /dev/loop3 05:49:03 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 251.028440] erofs: options -> acl,noacl, [ 251.031518] erofs: read_super, device -> /dev/loop2 05:49:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) 05:49:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 251.072120] erofs: unmounted for /dev/loop5 [ 251.076997] erofs: options -> [ 251.094396] erofs: root inode @ nid 36 [ 251.099991] erofs: mounted on /dev/loop2 with opts: . [ 251.112722] erofs: unmounted for /dev/loop3 05:49:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f7, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 251.146203] erofs: read_super, device -> /dev/loop1 [ 251.163838] erofs: options -> nouser_xattr,acl, [ 251.181716] erofs: unmounted for /dev/loop2 [ 251.212021] FAULT_INJECTION: forcing a failure. [ 251.212021] name failslab, interval 1, probability 0, space 0, times 0 [ 251.223541] CPU: 0 PID: 16763 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 251.231430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.240784] Call Trace: [ 251.243388] dump_stack+0x1fc/0x2ef [ 251.247032] should_fail.cold+0xa/0xf [ 251.250837] ? setup_fault_attr+0x200/0x200 [ 251.255156] ? lock_acquire+0x170/0x3c0 05:49:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 251.259141] __should_failslab+0x115/0x180 [ 251.263373] should_failslab+0x5/0x10 [ 251.267164] kmem_cache_alloc+0x277/0x370 [ 251.271297] __kernfs_new_node+0xd2/0x680 [ 251.275441] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 251.280201] ? __mutex_unlock_slowpath+0xea/0x610 [ 251.285044] ? wait_for_completion_io+0x10/0x10 [ 251.289704] ? kernfs_next_descendant_post+0x19c/0x290 [ 251.294983] kernfs_new_node+0x92/0x120 [ 251.298975] __kernfs_create_file+0x51/0x340 [ 251.303385] sysfs_add_file_mode_ns+0x226/0x540 [ 251.308052] internal_create_group+0x355/0xb20 [ 251.312623] ? sysfs_remove_link_from_group+0x70/0x70 [ 251.317809] ? lock_downgrade+0x720/0x720 [ 251.321960] lo_ioctl+0xf7c/0x20e0 [ 251.325490] ? loop_set_status64+0x110/0x110 [ 251.329887] blkdev_ioctl+0x5cb/0x1a80 [ 251.333758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.339122] ? blkpg_ioctl+0x9d0/0x9d0 [ 251.343005] ? mark_held_locks+0xf0/0xf0 [ 251.347052] ? mark_held_locks+0xf0/0xf0 [ 251.351113] ? debug_check_no_obj_freed+0x201/0x490 [ 251.356142] ? lock_downgrade+0x720/0x720 [ 251.360298] block_ioctl+0xe9/0x130 [ 251.363919] ? blkdev_fallocate+0x3f0/0x3f0 [ 251.368230] do_vfs_ioctl+0xcdb/0x12e0 [ 251.372140] ? lock_downgrade+0x720/0x720 [ 251.376293] ? check_preemption_disabled+0x41/0x280 [ 251.381304] ? ioctl_preallocate+0x200/0x200 [ 251.385699] ? __fget+0x356/0x510 [ 251.389138] ? do_dup2+0x450/0x450 [ 251.392714] ? do_sys_open+0x2bf/0x520 [ 251.396607] ksys_ioctl+0x9b/0xc0 [ 251.400071] __x64_sys_ioctl+0x6f/0xb0 [ 251.403954] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 251.408534] do_syscall_64+0xf9/0x620 [ 251.412391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.417573] RIP: 0033:0x4658c7 [ 251.420770] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.439677] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 251.447458] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 251.454761] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 251.462030] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 251.469297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 251.476561] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 251.486396] erofs: unmounted for /dev/loop1 [ 251.528486] erofs: read_super, device -> /dev/loop3 [ 251.529742] erofs: read_super, device -> /dev/loop4 [ 251.546463] erofs: read_super, device -> /dev/loop5 [ 251.551622] erofs: options -> acl,noacl, [ 251.551734] erofs: options -> acl,noacl, [ 251.555816] erofs: root inode @ nid 36 [ 251.571813] erofs: read_super, device -> /dev/loop0 05:49:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 251.599436] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl,user_xattr, [ 251.628336] erofs: mounted on /dev/loop5 with opts: acl. [ 251.631405] erofs: root inode @ nid 36 [ 251.641871] erofs: options -> 05:49:03 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 251.647955] erofs: unmounted for /dev/loop3 [ 251.653012] erofs: blksize 1 isn't supported on this platform [ 251.655052] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 251.688446] erofs: read_super, device -> /dev/loop1 [ 251.693506] erofs: options -> nouser_xattr,noacl, [ 251.709867] erofs: unmounted for /dev/loop5 05:49:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 251.773546] erofs: unmounted for /dev/loop0 05:49:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 251.806211] erofs: read_super, device -> /dev/loop2 [ 251.812006] erofs: options -> [ 251.815360] erofs: root inode @ nid 36 [ 251.821622] erofs: mounted on /dev/loop2 with opts: . [ 251.827123] erofs: read_super, device -> /dev/loop3 [ 251.832147] erofs: options -> acl,noacl, [ 251.848638] erofs: unmounted for /dev/loop1 05:49:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 251.871117] erofs: read_super, device -> /dev/loop4 [ 251.876180] erofs: options -> [ 251.908190] erofs: blksize 1 isn't supported on this platform 05:49:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x414, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 251.948619] erofs: unmounted for /dev/loop3 [ 251.959472] erofs: unmounted for /dev/loop2 05:49:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 251.989038] FAULT_INJECTION: forcing a failure. [ 251.989038] name failslab, interval 1, probability 0, space 0, times 0 [ 252.002687] CPU: 0 PID: 16799 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 252.010600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.019962] Call Trace: [ 252.022554] dump_stack+0x1fc/0x2ef [ 252.026171] should_fail.cold+0xa/0xf [ 252.029970] ? setup_fault_attr+0x200/0x200 [ 252.034292] ? lock_acquire+0x170/0x3c0 [ 252.038277] __should_failslab+0x115/0x180 [ 252.042510] should_failslab+0x5/0x10 [ 252.046297] kmem_cache_alloc+0x277/0x370 [ 252.050430] __kernfs_new_node+0xd2/0x680 [ 252.054574] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 252.059330] ? __mutex_unlock_slowpath+0xea/0x610 [ 252.064167] ? wait_for_completion_io+0x10/0x10 [ 252.068819] ? kernfs_next_descendant_post+0x19c/0x290 [ 252.074154] kernfs_new_node+0x92/0x120 [ 252.078126] __kernfs_create_file+0x51/0x340 [ 252.082526] sysfs_add_file_mode_ns+0x226/0x540 [ 252.087185] internal_create_group+0x355/0xb20 [ 252.091754] ? sysfs_remove_link_from_group+0x70/0x70 [ 252.096931] ? lock_downgrade+0x720/0x720 [ 252.101081] lo_ioctl+0xf7c/0x20e0 [ 252.104611] ? loop_set_status64+0x110/0x110 [ 252.109001] blkdev_ioctl+0x5cb/0x1a80 [ 252.112869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.118226] ? blkpg_ioctl+0x9d0/0x9d0 [ 252.122109] ? mark_held_locks+0xf0/0xf0 [ 252.126159] ? mark_held_locks+0xf0/0xf0 [ 252.130211] ? debug_check_no_obj_freed+0x201/0x490 [ 252.135217] ? lock_downgrade+0x720/0x720 [ 252.139367] block_ioctl+0xe9/0x130 [ 252.142995] ? blkdev_fallocate+0x3f0/0x3f0 [ 252.147309] do_vfs_ioctl+0xcdb/0x12e0 [ 252.151181] ? lock_downgrade+0x720/0x720 [ 252.155313] ? check_preemption_disabled+0x41/0x280 [ 252.160326] ? ioctl_preallocate+0x200/0x200 [ 252.164733] ? __fget+0x356/0x510 [ 252.168188] ? do_dup2+0x450/0x450 [ 252.171723] ? do_sys_open+0x2bf/0x520 [ 252.175596] ksys_ioctl+0x9b/0xc0 [ 252.179047] __x64_sys_ioctl+0x6f/0xb0 [ 252.182930] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 252.187500] do_syscall_64+0xf9/0x620 [ 252.191307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.196490] RIP: 0033:0x4658c7 [ 252.199678] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.218581] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.226284] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 252.233537] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 252.240798] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 252.248070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 252.255336] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 252.279972] erofs: read_super, device -> /dev/loop1 [ 252.285025] erofs: options -> nouser_xattr,noacl, 05:49:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 05:49:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 252.471136] erofs: unmounted for /dev/loop1 [ 252.485523] erofs: read_super, device -> /dev/loop5 [ 252.491273] erofs: options -> acl,noacl, [ 252.495516] erofs: root inode @ nid 36 [ 252.510036] erofs: mounted on /dev/loop5 with opts: acl. 05:49:04 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 252.536368] erofs: read_super, device -> /dev/loop3 [ 252.554267] erofs: options -> acl,noacl, [ 252.572695] erofs: unmounted for /dev/loop5 [ 252.631631] erofs: read_super, device -> /dev/loop2 [ 252.631979] erofs: read_super, device -> /dev/loop1 [ 252.640186] erofs: options -> [ 252.642187] erofs: read_super, device -> /dev/loop4 05:49:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 252.676299] erofs: options -> [ 252.676402] erofs: root inode @ nid 36 [ 252.684069] erofs: options -> nouser_xattr,noacl, [ 252.713448] erofs: unmounted for /dev/loop3 [ 252.717199] erofs: mounted on /dev/loop2 with opts: . [ 252.722918] erofs: blksize 1 isn't supported on this platform 05:49:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}]}) 05:49:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x415, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 252.803817] erofs: unmounted for /dev/loop1 [ 252.808728] erofs: unmounted for /dev/loop2 [ 252.898686] FAULT_INJECTION: forcing a failure. [ 252.898686] name failslab, interval 1, probability 0, space 0, times 0 [ 252.910497] CPU: 0 PID: 16851 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 252.918388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.927740] Call Trace: [ 252.930346] dump_stack+0x1fc/0x2ef [ 252.933971] should_fail.cold+0xa/0xf [ 252.937758] ? setup_fault_attr+0x200/0x200 [ 252.942130] ? lock_acquire+0x170/0x3c0 [ 252.946100] __should_failslab+0x115/0x180 [ 252.950336] should_failslab+0x5/0x10 [ 252.954131] kmem_cache_alloc+0x277/0x370 [ 252.958273] __kernfs_new_node+0xd2/0x680 [ 252.962415] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 252.967164] ? __mutex_unlock_slowpath+0xea/0x610 [ 252.972012] ? wait_for_completion_io+0x10/0x10 [ 252.976676] ? kernfs_next_descendant_post+0x19c/0x290 [ 252.981939] kernfs_new_node+0x92/0x120 [ 252.985911] __kernfs_create_file+0x51/0x340 [ 252.990322] sysfs_add_file_mode_ns+0x226/0x540 [ 252.995006] internal_create_group+0x355/0xb20 [ 252.999584] ? sysfs_remove_link_from_group+0x70/0x70 [ 253.004826] ? lock_downgrade+0x720/0x720 [ 253.008983] lo_ioctl+0xf7c/0x20e0 [ 253.012521] ? loop_set_status64+0x110/0x110 [ 253.016973] blkdev_ioctl+0x5cb/0x1a80 [ 253.020905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.026251] ? blkpg_ioctl+0x9d0/0x9d0 [ 253.030137] ? mark_held_locks+0xf0/0xf0 [ 253.034207] ? mark_held_locks+0xf0/0xf0 [ 253.038270] ? debug_check_no_obj_freed+0x201/0x490 [ 253.043277] ? lock_downgrade+0x720/0x720 [ 253.047414] block_ioctl+0xe9/0x130 [ 253.051039] ? blkdev_fallocate+0x3f0/0x3f0 [ 253.055401] do_vfs_ioctl+0xcdb/0x12e0 [ 253.059279] ? lock_downgrade+0x720/0x720 [ 253.063460] ? check_preemption_disabled+0x41/0x280 [ 253.068474] ? ioctl_preallocate+0x200/0x200 [ 253.072879] ? __fget+0x356/0x510 [ 253.076317] ? do_dup2+0x450/0x450 [ 253.079843] ? do_sys_open+0x2bf/0x520 [ 253.083716] ksys_ioctl+0x9b/0xc0 [ 253.087154] __x64_sys_ioctl+0x6f/0xb0 [ 253.091036] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 253.095613] do_syscall_64+0xf9/0x620 [ 253.099412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.104590] RIP: 0033:0x4658c7 [ 253.107782] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.126682] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.134379] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 253.141643] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 253.148907] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 253.156170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 253.163421] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 253.236817] erofs: read_super, device -> /dev/loop5 [ 253.257233] erofs: options -> acl,noacl, [ 253.262675] erofs: root inode @ nid 36 [ 253.267126] erofs: mounted on /dev/loop5 with opts: acl. [ 253.272897] erofs: read_super, device -> /dev/loop3 [ 253.280520] erofs: read_super, device -> /dev/loop4 [ 253.288983] erofs: options -> acl,noacl, [ 253.298930] erofs: options -> 05:49:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 253.307069] erofs: read_super, device -> /dev/loop0 [ 253.310663] erofs: blksize 1 isn't supported on this platform 05:49:05 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 253.354408] erofs: unmounted for /dev/loop3 [ 253.357205] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl,acl, [ 253.367816] erofs: root inode @ nid 36 05:49:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 253.415327] erofs: unmounted for /dev/loop5 [ 253.419429] erofs: mounted on /dev/loop0 with opts: nouser_xattr. 05:49:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 253.563638] erofs: unmounted for /dev/loop0 [ 253.574329] erofs: read_super, device -> /dev/loop1 [ 253.585150] erofs: read_super, device -> /dev/loop2 [ 253.600776] erofs: options -> acl,noacl, [ 253.604994] erofs: options -> [ 253.611330] erofs: root inode @ nid 36 [ 253.615520] erofs: mounted on /dev/loop2 with opts: . [ 253.623576] erofs: read_super, device -> /dev/loop3 [ 253.631651] erofs: options -> acl,noacl, [ 253.640728] FAULT_INJECTION: forcing a failure. [ 253.640728] name failslab, interval 1, probability 0, space 0, times 0 [ 253.652899] CPU: 0 PID: 16886 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 253.660797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.670151] Call Trace: [ 253.672731] dump_stack+0x1fc/0x2ef [ 253.676345] should_fail.cold+0xa/0xf [ 253.680136] ? setup_fault_attr+0x200/0x200 [ 253.684454] ? lock_acquire+0x170/0x3c0 [ 253.688445] __should_failslab+0x115/0x180 [ 253.692675] should_failslab+0x5/0x10 [ 253.696470] kmem_cache_alloc+0x277/0x370 [ 253.700632] __kernfs_new_node+0xd2/0x680 [ 253.704769] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 253.709531] ? __mutex_unlock_slowpath+0xea/0x610 [ 253.714367] ? wait_for_completion_io+0x10/0x10 [ 253.719025] ? kernfs_next_descendant_post+0x19c/0x290 [ 253.724290] kernfs_new_node+0x92/0x120 [ 253.728253] __kernfs_create_file+0x51/0x340 [ 253.732651] sysfs_add_file_mode_ns+0x226/0x540 [ 253.737317] internal_create_group+0x355/0xb20 [ 253.741888] ? sysfs_remove_link_from_group+0x70/0x70 [ 253.747058] ? lock_downgrade+0x720/0x720 [ 253.751195] lo_ioctl+0xf7c/0x20e0 [ 253.754721] ? loop_set_status64+0x110/0x110 [ 253.759117] blkdev_ioctl+0x5cb/0x1a80 [ 253.762987] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.768343] ? blkpg_ioctl+0x9d0/0x9d0 [ 253.772223] ? mark_held_locks+0xf0/0xf0 [ 253.776271] ? mark_held_locks+0xf0/0xf0 [ 253.780331] ? debug_check_no_obj_freed+0x201/0x490 [ 253.785335] ? lock_downgrade+0x720/0x720 [ 253.789481] block_ioctl+0xe9/0x130 [ 253.793101] ? blkdev_fallocate+0x3f0/0x3f0 [ 253.797415] do_vfs_ioctl+0xcdb/0x12e0 [ 253.801292] ? lock_downgrade+0x720/0x720 [ 253.805425] ? check_preemption_disabled+0x41/0x280 [ 253.810428] ? ioctl_preallocate+0x200/0x200 [ 253.814824] ? __fget+0x356/0x510 [ 253.818266] ? do_dup2+0x450/0x450 [ 253.821793] ? do_sys_open+0x2bf/0x520 [ 253.825666] ksys_ioctl+0x9b/0xc0 [ 253.829116] __x64_sys_ioctl+0x6f/0xb0 [ 253.833020] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 253.837608] do_syscall_64+0xf9/0x620 [ 253.841396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.846568] RIP: 0033:0x4658c7 [ 253.849761] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.868675] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.876402] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 253.883677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 253.890932] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 253.898184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 253.905435] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x416, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 253.939106] erofs: read_super, device -> /dev/loop5 [ 253.947014] erofs: options -> acl,noacl, [ 253.960251] erofs: root inode @ nid 36 [ 253.967294] erofs: read_super, device -> /dev/loop4 [ 253.969899] erofs: mounted on /dev/loop5 with opts: acl. [ 253.980532] erofs: unmounted for /dev/loop2 [ 253.986273] erofs: options -> 05:49:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 253.993698] erofs: blksize 1 isn't supported on this platform [ 253.999721] erofs: unmounted for /dev/loop1 [ 254.031284] erofs: unmounted for /dev/loop3 05:49:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) 05:49:06 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 254.087706] erofs: unmounted for /dev/loop5 [ 254.142647] erofs: read_super, device -> /dev/loop2 [ 254.147702] erofs: options -> [ 254.148891] erofs: read_super, device -> /dev/loop0 [ 254.152003] erofs: root inode @ nid 36 [ 254.161849] erofs: mounted on /dev/loop2 with opts: . [ 254.172749] erofs: read_super, device -> /dev/loop1 [ 254.177945] erofs: options -> nouser_xattr,acl,noacl, [ 254.178010] erofs: read_super, device -> /dev/loop3 05:49:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x417, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 254.190977] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 254.191854] erofs: options -> acl,noacl, [ 254.236927] FAULT_INJECTION: forcing a failure. [ 254.236927] name failslab, interval 1, probability 0, space 0, times 0 [ 254.237868] erofs: root inode @ nid 36 [ 254.249838] CPU: 1 PID: 16921 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 254.255280] erofs: unmounted for /dev/loop2 [ 254.260002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.260008] Call Trace: [ 254.260031] dump_stack+0x1fc/0x2ef [ 254.260050] should_fail.cold+0xa/0xf [ 254.283670] ? setup_fault_attr+0x200/0x200 [ 254.287982] ? lock_acquire+0x170/0x3c0 [ 254.291948] __should_failslab+0x115/0x180 [ 254.296170] should_failslab+0x5/0x10 [ 254.299955] kmem_cache_alloc+0x277/0x370 [ 254.304091] __kernfs_new_node+0xd2/0x680 [ 254.308228] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 254.312975] ? __mutex_unlock_slowpath+0xea/0x610 [ 254.317804] ? wait_for_completion_io+0x10/0x10 [ 254.322460] ? kernfs_next_descendant_post+0x19c/0x290 [ 254.327729] kernfs_new_node+0x92/0x120 [ 254.331695] __kernfs_create_file+0x51/0x340 [ 254.336094] sysfs_add_file_mode_ns+0x226/0x540 [ 254.340753] internal_create_group+0x355/0xb20 [ 254.345326] ? sysfs_remove_link_from_group+0x70/0x70 [ 254.350501] ? lock_downgrade+0x720/0x720 [ 254.354645] lo_ioctl+0xf7c/0x20e0 [ 254.358191] ? loop_set_status64+0x110/0x110 [ 254.362590] blkdev_ioctl+0x5cb/0x1a80 [ 254.366489] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.371864] ? blkpg_ioctl+0x9d0/0x9d0 [ 254.375738] ? mark_held_locks+0xf0/0xf0 [ 254.379787] ? mark_held_locks+0xf0/0xf0 [ 254.383839] ? debug_check_no_obj_freed+0x201/0x490 [ 254.388843] ? lock_downgrade+0x720/0x720 [ 254.392982] block_ioctl+0xe9/0x130 [ 254.396594] ? blkdev_fallocate+0x3f0/0x3f0 [ 254.400903] do_vfs_ioctl+0xcdb/0x12e0 [ 254.404778] ? lock_downgrade+0x720/0x720 [ 254.408912] ? check_preemption_disabled+0x41/0x280 [ 254.413914] ? ioctl_preallocate+0x200/0x200 [ 254.418309] ? __fget+0x356/0x510 [ 254.421751] ? do_dup2+0x450/0x450 [ 254.425306] ? do_sys_open+0x2bf/0x520 [ 254.429197] ksys_ioctl+0x9b/0xc0 [ 254.432645] __x64_sys_ioctl+0x6f/0xb0 [ 254.436529] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 254.441098] do_syscall_64+0xf9/0x620 [ 254.444884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.450073] RIP: 0033:0x4658c7 [ 254.453254] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 254.472138] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 254.479829] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 05:49:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 254.487082] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 254.494333] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 254.501586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 254.508855] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 254.519725] erofs: unmounted for /dev/loop3 05:49:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x416, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 254.538815] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 254.546522] erofs: unmounted for /dev/loop1 05:49:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}]}) [ 254.680028] erofs: read_super, device -> /dev/loop4 [ 254.689414] erofs: read_super, device -> /dev/loop5 [ 254.695905] erofs: options -> [ 254.707600] erofs: options -> acl,noacl, [ 254.716060] erofs: blksize 1 isn't supported on this platform [ 254.717696] erofs: root inode @ nid 36 [ 254.742490] erofs: unmounted for /dev/loop0 [ 254.745128] erofs: mounted on /dev/loop5 with opts: acl. [ 254.770609] erofs: read_super, device -> /dev/loop1 [ 254.778134] erofs: options -> [ 254.782852] erofs: root inode @ nid 36 [ 254.787071] erofs: mounted on /dev/loop1 with opts: . [ 254.824107] erofs: read_super, device -> /dev/loop2 [ 254.829165] erofs: options -> [ 254.835306] erofs: read_super, device -> /dev/loop3 [ 254.848357] erofs: root inode @ nid 36 [ 254.849865] erofs: read_super, device -> /dev/loop4 [ 254.866036] erofs: options -> 05:49:07 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 254.895684] erofs: options -> acl,noacl, [ 254.907676] erofs: mounted on /dev/loop2 with opts: . [ 254.908514] erofs: blksize 1 isn't supported on this platform [ 254.932381] erofs: unmounted for /dev/loop5 [ 254.971265] erofs: unmounted for /dev/loop1 05:49:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 255.016870] erofs: unmounted for /dev/loop3 [ 255.081831] erofs: read_super, device -> /dev/loop0 [ 255.091851] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr,noacl, [ 255.102722] erofs: root inode @ nid 36 [ 255.107420] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 255.121218] FAULT_INJECTION: forcing a failure. [ 255.121218] name failslab, interval 1, probability 0, space 0, times 0 [ 255.132930] CPU: 1 PID: 16955 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 255.140836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.150199] Call Trace: [ 255.152802] dump_stack+0x1fc/0x2ef [ 255.156511] should_fail.cold+0xa/0xf [ 255.160322] ? setup_fault_attr+0x200/0x200 [ 255.164779] ? lock_acquire+0x170/0x3c0 [ 255.168889] ? dev_uevent_filter+0xd0/0xd0 [ 255.173262] __should_failslab+0x115/0x180 [ 255.177504] should_failslab+0x5/0x10 [ 255.181312] kmem_cache_alloc_trace+0x284/0x380 [ 255.185992] ? dev_uevent_filter+0xd0/0xd0 [ 255.190226] kobject_uevent_env+0x236/0x14a0 [ 255.194638] lo_ioctl+0xff9/0x20e0 [ 255.198176] ? loop_set_status64+0x110/0x110 [ 255.202585] blkdev_ioctl+0x5cb/0x1a80 [ 255.206605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.211977] ? blkpg_ioctl+0x9d0/0x9d0 [ 255.215873] ? mark_held_locks+0xf0/0xf0 [ 255.219936] ? mark_held_locks+0xf0/0xf0 [ 255.224008] ? debug_check_no_obj_freed+0x201/0x490 [ 255.229144] ? lock_downgrade+0x720/0x720 [ 255.233292] block_ioctl+0xe9/0x130 [ 255.236925] ? blkdev_fallocate+0x3f0/0x3f0 [ 255.241395] do_vfs_ioctl+0xcdb/0x12e0 [ 255.245382] ? lock_downgrade+0x720/0x720 [ 255.249543] ? check_preemption_disabled+0x41/0x280 [ 255.254580] ? ioctl_preallocate+0x200/0x200 [ 255.259001] ? __fget+0x356/0x510 [ 255.262468] ? do_dup2+0x450/0x450 [ 255.266230] ? do_sys_open+0x2bf/0x520 [ 255.270237] ksys_ioctl+0x9b/0xc0 [ 255.273831] __x64_sys_ioctl+0x6f/0xb0 [ 255.277716] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 255.282296] do_syscall_64+0xf9/0x620 [ 255.286096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.291299] RIP: 0033:0x4658c7 [ 255.294488] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 255.313556] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 255.321262] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 255.328528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 255.335807] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 255.343089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 255.350357] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}]}) 05:49:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x418, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 255.415942] erofs: read_super, device -> /dev/loop5 [ 255.417056] erofs: read_super, device -> /dev/loop1 [ 255.427696] erofs: options -> [ 255.438070] erofs: options -> acl,noacl, [ 255.438645] erofs: root inode @ nid 36 [ 255.455325] erofs: root inode @ nid 36 [ 255.457296] erofs: mounted on /dev/loop1 with opts: . [ 255.468203] erofs: unmounted for /dev/loop0 [ 255.468232] erofs: unmounted for /dev/loop2 [ 255.477255] erofs: mounted on /dev/loop5 with opts: acl. 05:49:07 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:07 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 255.554848] erofs: read_super, device -> /dev/loop3 [ 255.560620] erofs: read_super, device -> /dev/loop4 [ 255.565651] erofs: options -> [ 255.569263] erofs: unmounted for /dev/loop5 [ 255.584427] erofs: options -> acl,noacl, [ 255.590284] erofs: unmounted for /dev/loop1 [ 255.593084] erofs: blksize 1 isn't supported on this platform 05:49:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 255.688415] FAULT_INJECTION: forcing a failure. [ 255.688415] name failslab, interval 1, probability 0, space 0, times 0 [ 255.700976] CPU: 0 PID: 16989 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 255.709073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.718425] Call Trace: [ 255.721028] dump_stack+0x1fc/0x2ef [ 255.724840] should_fail.cold+0xa/0xf [ 255.728639] ? setup_fault_attr+0x200/0x200 [ 255.732961] ? lock_acquire+0x170/0x3c0 [ 255.736939] __should_failslab+0x115/0x180 [ 255.741171] should_failslab+0x5/0x10 [ 255.744967] __kmalloc+0x2ab/0x3c0 [ 255.748500] ? __se_sys_memfd_create+0xf8/0x440 [ 255.753166] __se_sys_memfd_create+0xf8/0x440 [ 255.757658] ? memfd_file_seals_ptr+0x150/0x150 [ 255.762447] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.767820] ? trace_hardirqs_off_caller+0x6e/0x210 [ 255.772844] ? do_syscall_64+0x21/0x620 [ 255.776974] do_syscall_64+0xf9/0x620 [ 255.780771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.785953] RIP: 0033:0x465b09 [ 255.789160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 255.808069] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 255.815789] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 255.823140] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 255.830424] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff 05:49:08 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 255.837700] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 255.844967] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 255.866954] FAULT_INJECTION: forcing a failure. [ 255.866954] name failslab, interval 1, probability 0, space 0, times 0 [ 255.885052] CPU: 0 PID: 16985 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 255.892978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.902343] Call Trace: [ 255.904936] dump_stack+0x1fc/0x2ef [ 255.908695] should_fail.cold+0xa/0xf [ 255.912505] ? setup_fault_attr+0x200/0x200 [ 255.916831] ? lock_acquire+0x170/0x3c0 [ 255.920820] __should_failslab+0x115/0x180 [ 255.925072] should_failslab+0x5/0x10 [ 255.928877] __kmalloc+0x2ab/0x3c0 [ 255.932552] ? kobject_get_path+0xbf/0x240 [ 255.936793] kobject_get_path+0xbf/0x240 [ 255.941894] kobject_uevent_env+0x25c/0x14a0 [ 255.946303] lo_ioctl+0xff9/0x20e0 [ 255.949839] ? loop_set_status64+0x110/0x110 [ 255.954259] blkdev_ioctl+0x5cb/0x1a80 [ 255.958153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.963525] ? blkpg_ioctl+0x9d0/0x9d0 [ 255.967426] ? mark_held_locks+0xf0/0xf0 [ 255.971497] ? mark_held_locks+0xf0/0xf0 [ 255.975571] ? debug_check_no_obj_freed+0x201/0x490 [ 255.980600] ? lock_downgrade+0x720/0x720 [ 255.984914] block_ioctl+0xe9/0x130 [ 255.988538] ? blkdev_fallocate+0x3f0/0x3f0 [ 255.992867] do_vfs_ioctl+0xcdb/0x12e0 [ 255.996788] ? lock_downgrade+0x720/0x720 [ 256.001111] ? check_preemption_disabled+0x41/0x280 [ 256.006301] ? ioctl_preallocate+0x200/0x200 [ 256.010860] ? __fget+0x356/0x510 [ 256.014337] ? do_dup2+0x450/0x450 [ 256.017975] ? do_sys_open+0x2bf/0x520 [ 256.021879] ksys_ioctl+0x9b/0xc0 [ 256.025575] __x64_sys_ioctl+0x6f/0xb0 [ 256.029461] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 256.034055] do_syscall_64+0xf9/0x620 [ 256.037880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.043080] RIP: 0033:0x4658c7 [ 256.046269] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.065168] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.072893] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 256.080346] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 256.087759] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 256.095035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 256.102322] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 256.122996] erofs: read_super, device -> /dev/loop0 [ 256.126238] erofs: read_super, device -> /dev/loop2 [ 256.128056] erofs: options -> nouser_xattr,acl,noacl,nouser_xattr, [ 256.140034] erofs: options -> [ 256.148197] erofs: root inode @ nid 36 [ 256.152530] erofs: read_super, device -> /dev/loop5 [ 256.159990] erofs: options -> acl,noacl, [ 256.181385] erofs: root inode @ nid 36 [ 256.182375] erofs: mounted on /dev/loop2 with opts: . 05:49:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 256.196610] erofs: mounted on /dev/loop5 with opts: acl. [ 256.202242] erofs: unmounted for /dev/loop3 [ 256.207430] erofs: root inode @ nid 36 [ 256.217286] FAULT_INJECTION: forcing a failure. [ 256.217286] name failslab, interval 1, probability 0, space 0, times 0 [ 256.219937] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 256.255548] CPU: 0 PID: 17000 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 256.263558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.264348] erofs: read_super, device -> /dev/loop4 [ 256.272917] Call Trace: [ 256.272948] dump_stack+0x1fc/0x2ef [ 256.272969] should_fail.cold+0xa/0xf [ 256.272987] ? setup_fault_attr+0x200/0x200 [ 256.273002] ? lock_acquire+0x170/0x3c0 [ 256.273023] __should_failslab+0x115/0x180 [ 256.273043] should_failslab+0x5/0x10 05:49:08 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) [ 256.295903] erofs: options -> [ 256.296370] kmem_cache_alloc+0x277/0x370 [ 256.296388] ? shmem_destroy_callback+0xb0/0xb0 [ 256.296403] shmem_alloc_inode+0x18/0x40 [ 256.296414] ? shmem_destroy_callback+0xb0/0xb0 [ 256.296429] alloc_inode+0x5d/0x180 [ 256.308930] erofs: blksize 1 isn't supported on this platform [ 256.312105] new_inode+0x1d/0xf0 [ 256.312125] shmem_get_inode+0x96/0x8d0 [ 256.312148] __shmem_file_setup.part.0+0x7a/0x2b0 [ 256.312167] shmem_file_setup+0x61/0x90 [ 256.312182] __se_sys_memfd_create+0x26b/0x440 05:49:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x419, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 256.312197] ? memfd_file_seals_ptr+0x150/0x150 [ 256.312211] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.312227] ? trace_hardirqs_off_caller+0x6e/0x210 [ 256.312240] ? do_syscall_64+0x21/0x620 [ 256.312255] do_syscall_64+0xf9/0x620 [ 256.379406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.384617] RIP: 0033:0x465b09 [ 256.387828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.406743] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 256.414453] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 256.421733] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 256.429123] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 256.436652] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 256.444058] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:49:08 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 256.456228] erofs: unmounted for /dev/loop5 [ 256.462218] erofs: unmounted for /dev/loop2 [ 256.466740] erofs: unmounted for /dev/loop0 [ 256.483206] erofs: read_super, device -> /dev/loop4 [ 256.488358] erofs: options -> [ 256.499897] erofs: blksize 1 isn't supported on this platform 05:49:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 256.641930] erofs: read_super, device -> /dev/loop3 [ 256.646999] erofs: options -> acl,noacl, [ 256.659368] FAULT_INJECTION: forcing a failure. [ 256.659368] name failslab, interval 1, probability 0, space 0, times 0 [ 256.676528] CPU: 1 PID: 17026 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 256.684449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.693820] Call Trace: [ 256.696532] dump_stack+0x1fc/0x2ef [ 256.700169] should_fail.cold+0xa/0xf [ 256.703967] ? setup_fault_attr+0x200/0x200 [ 256.708286] ? lock_acquire+0x170/0x3c0 [ 256.712261] __should_failslab+0x115/0x180 [ 256.716500] should_failslab+0x5/0x10 [ 256.720295] kmem_cache_alloc+0x277/0x370 [ 256.724438] __d_alloc+0x2b/0xa10 [ 256.727912] d_alloc_pseudo+0x19/0x70 [ 256.731716] alloc_file_pseudo+0xc6/0x250 [ 256.735865] ? alloc_file+0x4d0/0x4d0 [ 256.739672] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 256.745292] ? shmem_get_inode+0x44c/0x8d0 [ 256.749528] __shmem_file_setup.part.0+0x102/0x2b0 [ 256.754472] shmem_file_setup+0x61/0x90 [ 256.758451] __se_sys_memfd_create+0x26b/0x440 [ 256.763036] ? memfd_file_seals_ptr+0x150/0x150 [ 256.767701] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.773267] ? trace_hardirqs_off_caller+0x6e/0x210 [ 256.778537] ? do_syscall_64+0x21/0x620 [ 256.782516] do_syscall_64+0xf9/0x620 [ 256.786595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.791839] RIP: 0033:0x465b09 [ 256.795024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.814206] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 256.821922] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 256.829198] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:49:09 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 256.836728] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 256.843996] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 256.851588] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 256.887234] erofs: read_super, device -> /dev/loop0 [ 256.887690] FAULT_INJECTION: forcing a failure. [ 256.887690] name failslab, interval 1, probability 0, space 0, times 0 [ 256.892696] erofs: options -> nouser_xattr,acl,noacl, [ 256.892977] erofs: root inode @ nid 36 [ 256.893171] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 256.922006] CPU: 0 PID: 17025 Comm: syz-executor.5 Not tainted 4.19.172-syzkaller #0 [ 256.930052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.939404] Call Trace: [ 256.942006] dump_stack+0x1fc/0x2ef [ 256.945638] should_fail.cold+0xa/0xf [ 256.949437] ? setup_fault_attr+0x200/0x200 [ 256.953779] ? lock_acquire+0x170/0x3c0 [ 256.957768] __should_failslab+0x115/0x180 [ 256.962013] should_failslab+0x5/0x10 [ 256.965820] __kmalloc+0x2ab/0x3c0 [ 256.969376] ? kobject_get_path+0xbf/0x240 [ 256.973743] kobject_get_path+0xbf/0x240 [ 256.977860] kobject_uevent_env+0x25c/0x14a0 [ 256.982472] lo_ioctl+0xff9/0x20e0 [ 256.986021] ? loop_set_status64+0x110/0x110 [ 256.990429] blkdev_ioctl+0x5cb/0x1a80 [ 256.994474] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.999854] ? blkpg_ioctl+0x9d0/0x9d0 [ 257.003759] ? mark_held_locks+0xf0/0xf0 [ 257.007827] ? mark_held_locks+0xf0/0xf0 [ 257.011900] ? debug_check_no_obj_freed+0x201/0x490 [ 257.017123] ? lock_downgrade+0x720/0x720 [ 257.021424] block_ioctl+0xe9/0x130 [ 257.025060] ? blkdev_fallocate+0x3f0/0x3f0 [ 257.029375] do_vfs_ioctl+0xcdb/0x12e0 [ 257.033271] ? lock_downgrade+0x720/0x720 [ 257.037430] ? check_preemption_disabled+0x41/0x280 [ 257.042462] ? ioctl_preallocate+0x200/0x200 [ 257.046880] ? __fget+0x356/0x510 [ 257.050327] ? do_dup2+0x450/0x450 [ 257.053987] ? do_sys_open+0x2bf/0x520 [ 257.057897] ksys_ioctl+0x9b/0xc0 [ 257.061375] __x64_sys_ioctl+0x6f/0xb0 [ 257.065273] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 257.069955] do_syscall_64+0xf9/0x620 [ 257.073774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.079057] RIP: 0033:0x4658c7 [ 257.082255] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.101321] RSP: 002b:00007f9d64cc6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.109037] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 257.116309] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 257.123586] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 257.130868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 257.138144] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 257.183031] erofs: read_super, device -> /dev/loop2 [ 257.197875] erofs: read_super, device -> /dev/loop5 [ 257.207426] erofs: options -> [ 257.212907] erofs: root inode @ nid 36 05:49:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 05:49:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41a, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 257.235128] erofs: options -> acl,noacl, [ 257.237154] erofs: mounted on /dev/loop2 with opts: . [ 257.268122] erofs: unmounted for /dev/loop0 [ 257.276695] erofs: unmounted for /dev/loop2 05:49:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 257.282421] erofs: root inode @ nid 36 [ 257.286431] erofs: mounted on /dev/loop5 with opts: acl. [ 257.295926] erofs: unmounted for /dev/loop3 [ 257.318177] FAULT_INJECTION: forcing a failure. [ 257.318177] name failslab, interval 1, probability 0, space 0, times 0 [ 257.330080] CPU: 1 PID: 17035 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 257.338132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.347513] Call Trace: [ 257.350128] dump_stack+0x1fc/0x2ef [ 257.353914] should_fail.cold+0xa/0xf [ 257.357738] ? setup_fault_attr+0x200/0x200 [ 257.362081] ? lock_acquire+0x170/0x3c0 [ 257.366082] __should_failslab+0x115/0x180 [ 257.370339] should_failslab+0x5/0x10 [ 257.374158] kmem_cache_alloc+0x277/0x370 [ 257.378337] __alloc_file+0x21/0x330 [ 257.382068] alloc_empty_file+0x6d/0x170 [ 257.386147] alloc_file+0x5e/0x4d0 [ 257.389707] alloc_file_pseudo+0x165/0x250 [ 257.393963] ? alloc_file+0x4d0/0x4d0 [ 257.397780] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 257.403430] ? shmem_get_inode+0x44c/0x8d0 [ 257.407688] __shmem_file_setup.part.0+0x102/0x2b0 [ 257.412753] shmem_file_setup+0x61/0x90 [ 257.416745] __se_sys_memfd_create+0x26b/0x440 [ 257.421356] ? memfd_file_seals_ptr+0x150/0x150 [ 257.426037] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.431576] ? trace_hardirqs_off_caller+0x6e/0x210 [ 257.436620] ? do_syscall_64+0x21/0x620 [ 257.440594] do_syscall_64+0xf9/0x620 [ 257.444410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.449731] RIP: 0033:0x465b09 [ 257.452921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.472156] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:49:09 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 257.479983] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 257.487247] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 257.494626] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 257.501895] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 257.509161] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 257.594336] erofs: read_super, device -> /dev/loop4 [ 257.599405] erofs: options -> [ 257.611331] erofs: read_super, device -> /dev/loop2 [ 257.618162] erofs: options -> [ 257.623096] erofs: root inode @ nid 36 [ 257.630666] erofs: read_super, device -> /dev/loop0 [ 257.637211] erofs: mounted on /dev/loop2 with opts: . 05:49:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 257.643163] erofs: options -> nouser_xattr,acl, [ 257.648322] erofs: unmounted for /dev/loop5 [ 257.654578] erofs: blksize 1 isn't supported on this platform [ 257.669416] erofs: root inode @ nid 36 05:49:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41b, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 257.690281] FAULT_INJECTION: forcing a failure. [ 257.690281] name failslab, interval 1, probability 0, space 0, times 0 [ 257.695375] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 257.721459] erofs: unmounted for /dev/loop2 [ 257.734139] erofs: read_super, device -> /dev/loop4 [ 257.736320] erofs: read_super, device -> /dev/loop3 [ 257.741596] erofs: options -> [ 257.751341] CPU: 0 PID: 17056 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 257.754601] erofs: blksize 1 isn't supported on this platform [ 257.759254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.759262] Call Trace: [ 257.759292] dump_stack+0x1fc/0x2ef [ 257.759311] should_fail.cold+0xa/0xf [ 257.772999] erofs: options -> acl,noacl, [ 257.774660] ? setup_fault_attr+0x200/0x200 [ 257.774676] ? lock_acquire+0x170/0x3c0 [ 257.774695] __should_failslab+0x115/0x180 [ 257.802406] should_failslab+0x5/0x10 [ 257.806220] kmem_cache_alloc_trace+0x284/0x380 [ 257.810909] apparmor_file_alloc_security+0x394/0xad0 [ 257.816123] ? apparmor_file_receive+0x160/0x160 [ 257.821040] ? __alloc_file+0x21/0x330 [ 257.824945] security_file_alloc+0x40/0x90 [ 257.829197] __alloc_file+0xc9/0x330 [ 257.833030] alloc_empty_file+0x6d/0x170 [ 257.837092] alloc_file+0x5e/0x4d0 [ 257.840647] alloc_file_pseudo+0x165/0x250 [ 257.844907] ? alloc_file+0x4d0/0x4d0 [ 257.848716] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 257.854355] ? shmem_get_inode+0x44c/0x8d0 [ 257.858610] __shmem_file_setup.part.0+0x102/0x2b0 [ 257.863566] shmem_file_setup+0x61/0x90 [ 257.867561] __se_sys_memfd_create+0x26b/0x440 [ 257.872155] ? memfd_file_seals_ptr+0x150/0x150 [ 257.876976] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.882553] ? trace_hardirqs_off_caller+0x6e/0x210 [ 257.887589] ? do_syscall_64+0x21/0x620 [ 257.891578] do_syscall_64+0xf9/0x620 [ 257.895384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.900573] RIP: 0033:0x465b09 [ 257.903772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.922877] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.930685] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 257.937958] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:49:10 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 257.945237] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 257.952707] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 257.960000] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 05:49:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 258.042903] erofs: read_super, device -> /dev/loop2 [ 258.048169] erofs: options -> [ 258.051960] erofs: root inode @ nid 36 [ 258.057787] erofs: mounted on /dev/loop2 with opts: . [ 258.080349] FAULT_INJECTION: forcing a failure. [ 258.080349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 258.093269] CPU: 0 PID: 17075 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 258.101182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.107873] erofs: read_super, device -> /dev/loop5 [ 258.110644] Call Trace: [ 258.118436] dump_stack+0x1fc/0x2ef [ 258.122083] should_fail.cold+0xa/0xf [ 258.125908] ? lock_acquire+0x170/0x3c0 [ 258.129905] ? setup_fault_attr+0x200/0x200 [ 258.134263] __alloc_pages_nodemask+0x239/0x2890 [ 258.139046] ? __lock_acquire+0x6de/0x3ff0 [ 258.139233] erofs: options -> acl,noacl, [ 258.143296] ? static_obj+0x50/0x50 [ 258.143314] ? __lock_acquire+0x6de/0x3ff0 [ 258.143329] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 258.143344] ? __lock_acquire+0x6de/0x3ff0 [ 258.143362] ? deref_stack_reg+0x134/0x1d0 [ 258.143377] ? mark_held_locks+0xf0/0xf0 [ 258.143393] ? mark_held_locks+0xf0/0xf0 [ 258.143408] ? unwind_next_frame+0x10a9/0x1c60 [ 258.143424] alloc_pages_vma+0xf2/0x780 [ 258.185749] shmem_alloc_page+0x11c/0x1f0 [ 258.189924] ? shmem_swapin+0x220/0x220 [ 258.193944] ? percpu_counter_add_batch+0x126/0x180 [ 258.198989] ? __vm_enough_memory+0x316/0x650 [ 258.203674] shmem_alloc_and_acct_page+0x15a/0x850 [ 258.208636] shmem_getpage_gfp+0x4e9/0x37f0 [ 258.213145] ? shmem_alloc_and_acct_page+0x850/0x850 [ 258.218277] ? mark_held_locks+0xa6/0xf0 [ 258.222363] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 258.224385] erofs: root inode @ nid 36 [ 258.227574] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 258.231582] erofs: mounted on /dev/loop5 with opts: acl. [ 258.236706] shmem_write_begin+0xff/0x1e0 [ 258.236726] generic_perform_write+0x1f8/0x4d0 [ 258.236748] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 258.236761] ? current_time+0x1c0/0x1c0 [ 258.236778] ? lock_acquire+0x170/0x3c0 [ 258.236794] __generic_file_write_iter+0x24b/0x610 [ 258.236811] generic_file_write_iter+0x3f8/0x730 [ 258.236831] __vfs_write+0x51b/0x770 [ 258.236845] ? kernel_read+0x110/0x110 [ 258.236867] ? check_preemption_disabled+0x41/0x280 [ 258.236886] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 258.236904] vfs_write+0x1f3/0x540 [ 258.236923] __x64_sys_pwrite64+0x1f7/0x250 [ 258.236938] ? ksys_pwrite64+0x1a0/0x1a0 [ 258.236956] ? trace_hardirqs_off_caller+0x6e/0x210 [ 258.236971] ? do_syscall_64+0x21/0x620 [ 258.236985] do_syscall_64+0xf9/0x620 [ 258.237004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.321248] RIP: 0033:0x4191a7 [ 258.324460] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 05:49:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41c, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@nouser_xattr='nouser_xattr'}]}) [ 258.343384] RSP: 002b:00007f027c8ebf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 258.351281] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 258.358670] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 258.366114] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 258.373545] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 258.380836] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 258.409428] erofs: unmounted for /dev/loop2 [ 258.414871] erofs: unmounted for /dev/loop3 [ 258.419184] erofs: unmounted for /dev/loop0 05:49:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 258.487275] erofs: unmounted for /dev/loop5 [ 258.499228] erofs: read_super, device -> /dev/loop1 [ 258.504709] erofs: options -> acl,noacl, [ 258.509006] erofs: cannot find valid erofs superblock [ 258.603195] erofs: read_super, device -> /dev/loop4 [ 258.610097] erofs: options -> [ 258.614033] erofs: blksize 1 isn't supported on this platform [ 258.698568] erofs: read_super, device -> /dev/loop3 05:49:10 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 258.726800] erofs: read_super, device -> /dev/loop0 [ 258.740200] erofs: options -> acl,noacl, [ 258.750642] erofs: options -> nouser_xattr, [ 258.758051] erofs: root inode @ nid 36 [ 258.764788] erofs: mounted on /dev/loop0 with opts: nouser_xattr. [ 258.771849] erofs: read_super, device -> /dev/loop5 [ 258.786656] erofs: options -> acl,noacl, [ 258.791324] erofs: root inode @ nid 36 [ 258.797157] erofs: mounted on /dev/loop5 with opts: acl. [ 258.815281] erofs: read_super, device -> /dev/loop2 05:49:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 258.834983] erofs: options -> [ 258.849768] erofs: root inode @ nid 36 [ 258.865948] erofs: unmounted for /dev/loop0 [ 258.875159] erofs: unmounted for /dev/loop3 [ 258.881180] FAULT_INJECTION: forcing a failure. [ 258.881180] name failslab, interval 1, probability 0, space 0, times 0 [ 258.882079] erofs: mounted on /dev/loop2 with opts: . [ 258.898793] CPU: 1 PID: 17113 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 258.906698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.916239] Call Trace: [ 258.919047] dump_stack+0x1fc/0x2ef [ 258.922937] should_fail.cold+0xa/0xf [ 258.926776] ? setup_fault_attr+0x200/0x200 [ 258.931229] ? lock_acquire+0x170/0x3c0 [ 258.935339] __should_failslab+0x115/0x180 [ 258.939598] should_failslab+0x5/0x10 [ 258.943524] kmem_cache_alloc+0x277/0x370 [ 258.947736] getname_flags+0xce/0x590 [ 258.951602] do_sys_open+0x26c/0x520 [ 258.955313] ? filp_open+0x70/0x70 [ 258.958857] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.964216] ? trace_hardirqs_off_caller+0x6e/0x210 [ 258.969229] ? do_syscall_64+0x21/0x620 [ 258.973205] do_syscall_64+0xf9/0x620 [ 258.977102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.982297] RIP: 0033:0x4190f4 [ 258.985610] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 259.004769] RSP: 002b:00007f027c8ebed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 259.012484] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 259.019866] RDX: 0000000000000002 RSI: 00007f027c8ec000 RDI: 00000000ffffff9c [ 259.027306] RBP: 00007f027c8ec000 R08: 0000000000000000 R09: ffffffffffffffff 05:49:11 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 259.034579] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 259.042071] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41d, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 259.136339] erofs: read_super, device -> /dev/loop4 [ 259.149277] erofs: options -> [ 259.164224] erofs: unmounted for /dev/loop5 [ 259.172268] erofs: blksize 1 isn't supported on this platform [ 259.182642] erofs: unmounted for /dev/loop2 [ 259.195299] FAULT_INJECTION: forcing a failure. [ 259.195299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 259.197146] erofs: read_super, device -> /dev/loop0 [ 259.207142] CPU: 0 PID: 17126 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 259.207152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.207157] Call Trace: [ 259.207181] dump_stack+0x1fc/0x2ef [ 259.207199] should_fail.cold+0xa/0xf [ 259.207217] ? setup_fault_attr+0x200/0x200 [ 259.207234] ? do_writepages+0x290/0x290 [ 259.207251] ? unlock_page+0x13d/0x230 [ 259.207271] __alloc_pages_nodemask+0x239/0x2890 [ 259.207291] ? lock_downgrade+0x720/0x720 [ 259.207306] ? check_preemption_disabled+0x41/0x280 [ 259.207323] ? __lock_acquire+0x6de/0x3ff0 [ 259.222809] erofs: options -> [ 259.229784] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 259.229802] ? lock_downgrade+0x720/0x720 [ 259.229815] ? lock_acquire+0x170/0x3c0 [ 259.229834] ? up_write+0x18/0x150 [ 259.229848] ? generic_file_write_iter+0x381/0x730 [ 259.229864] ? iov_iter_init+0xb8/0x1d0 [ 259.229883] cache_grow_begin+0xa4/0x8a0 [ 259.229898] ? setup_fault_attr+0x200/0x200 [ 259.229911] ? lock_acquire+0x170/0x3c0 [ 259.229927] cache_alloc_refill+0x273/0x340 [ 259.241931] erofs: root inode @ nid 36 [ 259.244396] kmem_cache_alloc+0x346/0x370 [ 259.244416] getname_flags+0xce/0x590 [ 259.244434] do_sys_open+0x26c/0x520 [ 259.244450] ? filp_open+0x70/0x70 [ 259.244471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.244487] ? trace_hardirqs_off_caller+0x6e/0x210 [ 259.244502] ? do_syscall_64+0x21/0x620 [ 259.244521] do_syscall_64+0xf9/0x620 [ 259.254736] erofs: mounted on /dev/loop0 with opts: . [ 259.257396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.257410] RIP: 0033:0x4190f4 [ 259.257423] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 259.257433] RSP: 002b:00007f027c8ebed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 259.393610] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 259.400884] RDX: 0000000000000002 RSI: 00007f027c8ec000 RDI: 00000000ffffff9c [ 259.408380] RBP: 00007f027c8ec000 R08: 0000000000000000 R09: ffffffffffffffff [ 259.415654] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 259.422927] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 259.464238] erofs: read_super, device -> /dev/loop3 [ 259.469305] erofs: options -> acl,noacl, [ 259.485418] erofs: read_super, device -> /dev/loop1 [ 259.490461] erofs: options -> acl,noacl, [ 259.492862] erofs: read_super, device -> /dev/loop5 [ 259.499989] erofs: read_super, device -> /dev/loop4 [ 259.509629] erofs: options -> 05:49:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 259.514315] erofs: blksize 1 isn't supported on this platform [ 259.519512] erofs: options -> acl,noacl, [ 259.540582] erofs: root inode @ nid 36 [ 259.555642] erofs: unmounted for /dev/loop0 05:49:11 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 259.564875] erofs: mounted on /dev/loop5 with opts: acl. [ 259.571670] erofs: unmounted for /dev/loop1 05:49:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 259.608250] erofs: unmounted for /dev/loop3 [ 259.684114] erofs: read_super, device -> /dev/loop2 [ 259.689391] erofs: options -> [ 259.692983] erofs: root inode @ nid 36 [ 259.699479] erofs: mounted on /dev/loop2 with opts: . 05:49:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41e, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 259.750022] erofs: read_super, device -> /dev/loop4 [ 259.767225] erofs: options -> [ 259.788168] erofs: blksize 1 isn't supported on this platform [ 259.794240] erofs: unmounted for /dev/loop5 [ 259.830670] erofs: unmounted for /dev/loop2 [ 259.839452] FAULT_INJECTION: forcing a failure. [ 259.839452] name failslab, interval 1, probability 0, space 0, times 0 [ 259.851383] CPU: 1 PID: 17165 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 259.859376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.868969] Call Trace: [ 259.871634] dump_stack+0x1fc/0x2ef [ 259.875267] should_fail.cold+0xa/0xf [ 259.879070] ? setup_fault_attr+0x200/0x200 [ 259.883390] ? lock_acquire+0x170/0x3c0 [ 259.887368] __should_failslab+0x115/0x180 [ 259.891606] should_failslab+0x5/0x10 [ 259.895405] kmem_cache_alloc+0x277/0x370 [ 259.899551] __alloc_file+0x21/0x330 [ 259.903263] alloc_empty_file+0x6d/0x170 [ 259.907375] path_openat+0xe9/0x2df0 [ 259.911089] ? __lock_acquire+0x6de/0x3ff0 [ 259.915391] ? path_lookupat+0x8d0/0x8d0 [ 259.919452] ? mark_held_locks+0xf0/0xf0 [ 259.923524] do_filp_open+0x18c/0x3f0 [ 259.927320] ? may_open_dev+0xf0/0xf0 [ 259.931129] ? __alloc_fd+0x28d/0x570 [ 259.934931] ? lock_downgrade+0x720/0x720 [ 259.939153] ? lock_acquire+0x170/0x3c0 [ 259.943125] ? __alloc_fd+0x34/0x570 [ 259.946862] ? do_raw_spin_unlock+0x171/0x230 [ 259.951357] ? _raw_spin_unlock+0x29/0x40 [ 259.955500] ? __alloc_fd+0x28d/0x570 [ 259.959302] do_sys_open+0x3b3/0x520 [ 259.963013] ? filp_open+0x70/0x70 [ 259.966547] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.971908] ? trace_hardirqs_off_caller+0x6e/0x210 [ 259.976919] ? do_syscall_64+0x21/0x620 [ 259.980951] do_syscall_64+0xf9/0x620 [ 259.984867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.990268] RIP: 0033:0x4190f4 [ 259.993458] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 260.012353] RSP: 002b:00007f027c8ebed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 260.020063] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 260.027515] RDX: 0000000000000002 RSI: 00007f027c8ec000 RDI: 00000000ffffff9c [ 260.034785] RBP: 00007f027c8ec000 R08: 0000000000000000 R09: ffffffffffffffff [ 260.042053] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 260.049325] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:12 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 260.125414] erofs: read_super, device -> /dev/loop3 [ 260.130923] erofs: read_super, device -> /dev/loop5 [ 260.131928] erofs: read_super, device -> /dev/loop0 [ 260.136506] erofs: options -> acl,noacl, [ 260.148911] erofs: options -> acl,noacl, [ 260.159040] erofs: root inode @ nid 36 [ 260.164775] erofs: mounted on /dev/loop5 with opts: acl. [ 260.172995] erofs: options -> 05:49:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 260.215005] erofs: root inode @ nid 36 [ 260.245684] erofs: mounted on /dev/loop0 with opts: . [ 260.254961] erofs: unmounted for /dev/loop3 [ 260.262341] erofs: read_super, device -> /dev/loop2 [ 260.269456] FAULT_INJECTION: forcing a failure. [ 260.269456] name failslab, interval 1, probability 0, space 0, times 0 05:49:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 260.293293] erofs: options -> [ 260.298047] erofs: root inode @ nid 36 [ 260.303056] erofs: mounted on /dev/loop2 with opts: . [ 260.304552] erofs: unmounted for /dev/loop5 [ 260.309970] CPU: 1 PID: 17182 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 260.320735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.330083] Call Trace: [ 260.332677] dump_stack+0x1fc/0x2ef [ 260.336368] should_fail.cold+0xa/0xf [ 260.340167] ? setup_fault_attr+0x200/0x200 [ 260.344489] ? lock_acquire+0x170/0x3c0 [ 260.348462] __should_failslab+0x115/0x180 [ 260.352697] should_failslab+0x5/0x10 [ 260.356495] kmem_cache_alloc_trace+0x284/0x380 [ 260.361162] apparmor_file_alloc_security+0x394/0xad0 [ 260.366360] ? apparmor_file_receive+0x160/0x160 [ 260.371117] ? __alloc_file+0x21/0x330 [ 260.375006] security_file_alloc+0x40/0x90 [ 260.379237] __alloc_file+0xc9/0x330 [ 260.382945] alloc_empty_file+0x6d/0x170 [ 260.387005] path_openat+0xe9/0x2df0 [ 260.390714] ? __lock_acquire+0x6de/0x3ff0 [ 260.394952] ? path_lookupat+0x8d0/0x8d0 [ 260.399062] ? mark_held_locks+0xf0/0xf0 [ 260.403126] do_filp_open+0x18c/0x3f0 [ 260.406921] ? may_open_dev+0xf0/0xf0 [ 260.410717] ? __alloc_fd+0x28d/0x570 [ 260.414517] ? lock_downgrade+0x720/0x720 [ 260.418661] ? lock_acquire+0x170/0x3c0 [ 260.422629] ? __alloc_fd+0x34/0x570 [ 260.426339] ? do_raw_spin_unlock+0x171/0x230 [ 260.430827] ? _raw_spin_unlock+0x29/0x40 [ 260.434968] ? __alloc_fd+0x28d/0x570 [ 260.438771] do_sys_open+0x3b3/0x520 [ 260.442476] ? filp_open+0x70/0x70 [ 260.446011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.451457] ? trace_hardirqs_off_caller+0x6e/0x210 [ 260.456469] ? do_syscall_64+0x21/0x620 [ 260.460440] do_syscall_64+0xf9/0x620 [ 260.464245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.469423] RIP: 0033:0x4190f4 [ 260.472609] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 260.491505] RSP: 002b:00007f027c8ebed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 260.499206] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004190f4 [ 260.506471] RDX: 0000000000000002 RSI: 00007f027c8ec000 RDI: 00000000ffffff9c [ 260.513731] RBP: 00007f027c8ec000 R08: 0000000000000000 R09: ffffffffffffffff [ 260.520992] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 260.528251] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x41f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:12 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 260.550172] erofs: read_super, device -> /dev/loop4 [ 260.564211] erofs: unmounted for /dev/loop0 [ 260.575658] erofs: unmounted for /dev/loop2 [ 260.585914] erofs: options -> 05:49:12 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 260.599445] erofs: blksize 1 isn't supported on this platform [ 260.728000] FAULT_INJECTION: forcing a failure. [ 260.728000] name failslab, interval 1, probability 0, space 0, times 0 [ 260.739689] CPU: 0 PID: 17192 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 260.747584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.757044] Call Trace: [ 260.759654] dump_stack+0x1fc/0x2ef [ 260.763364] should_fail.cold+0xa/0xf [ 260.767179] ? setup_fault_attr+0x200/0x200 [ 260.771515] ? lock_acquire+0x170/0x3c0 [ 260.775511] __should_failslab+0x115/0x180 [ 260.779752] should_failslab+0x5/0x10 [ 260.783563] kmem_cache_alloc_trace+0x284/0x380 [ 260.788246] ? loop_info64_to_compat+0x5e0/0x5e0 [ 260.793119] __kthread_create_on_node+0xd2/0x410 [ 260.797886] ? kthread_parkme+0xa0/0xa0 [ 260.801878] ? lo_ioctl+0x1bb/0x20e0 [ 260.805605] ? __mutex_lock+0x3a8/0x1260 [ 260.809664] ? lock_downgrade+0x720/0x720 [ 260.813819] ? loop_info64_to_compat+0x5e0/0x5e0 [ 260.818585] kthread_create_on_node+0xbb/0xf0 [ 260.823084] ? __kthread_create_on_node+0x410/0x410 [ 260.828293] ? __fget+0x356/0x510 [ 260.831762] ? do_dup2+0x450/0x450 [ 260.835314] ? __lockdep_init_map+0x100/0x5a0 [ 260.839945] ? __lockdep_init_map+0x100/0x5a0 [ 260.844440] lo_ioctl+0xae5/0x20e0 [ 260.847980] ? loop_set_status64+0x110/0x110 [ 260.852504] blkdev_ioctl+0x5cb/0x1a80 [ 260.856399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.861769] ? blkpg_ioctl+0x9d0/0x9d0 [ 260.865664] ? mark_held_locks+0xf0/0xf0 [ 260.869734] ? mark_held_locks+0xf0/0xf0 [ 260.873794] ? debug_check_no_obj_freed+0x201/0x490 [ 260.878826] ? lock_downgrade+0x720/0x720 [ 260.882981] block_ioctl+0xe9/0x130 [ 260.886613] ? blkdev_fallocate+0x3f0/0x3f0 [ 260.890942] do_vfs_ioctl+0xcdb/0x12e0 [ 260.894841] ? lock_downgrade+0x720/0x720 [ 260.899006] ? check_preemption_disabled+0x41/0x280 [ 260.904036] ? ioctl_preallocate+0x200/0x200 [ 260.908459] ? __fget+0x356/0x510 [ 260.911924] ? do_dup2+0x450/0x450 [ 260.915471] ? do_sys_open+0x2bf/0x520 [ 260.919408] ksys_ioctl+0x9b/0xc0 [ 260.922877] __x64_sys_ioctl+0x6f/0xb0 [ 260.926797] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 260.931376] do_syscall_64+0xf9/0x620 [ 260.935187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.940388] RIP: 0033:0x4658c7 [ 260.943725] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 260.962748] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.970462] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 260.977753] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 260.985038] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 260.992305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 260.999576] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 261.044704] erofs: read_super, device -> /dev/loop3 [ 261.050053] erofs: options -> acl,noacl, [ 261.057314] erofs: read_super, device -> /dev/loop4 [ 261.057318] erofs: read_super, device -> /dev/loop2 [ 261.057327] erofs: options -> [ 261.062808] erofs: options -> [ 261.092209] FAULT_INJECTION: forcing a failure. [ 261.092209] name failslab, interval 1, probability 0, space 0, times 0 [ 261.104810] CPU: 1 PID: 17205 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 261.112866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.121247] erofs: blksize 1 isn't supported on this platform [ 261.122497] Call Trace: [ 261.122522] dump_stack+0x1fc/0x2ef [ 261.122543] should_fail.cold+0xa/0xf [ 261.122566] ? setup_fault_attr+0x200/0x200 [ 261.143080] ? lock_acquire+0x170/0x3c0 [ 261.147084] __should_failslab+0x115/0x180 [ 261.151469] should_failslab+0x5/0x10 [ 261.155283] __kmalloc+0x2ab/0x3c0 [ 261.158819] ? __se_sys_memfd_create+0xf8/0x440 [ 261.163486] __se_sys_memfd_create+0xf8/0x440 [ 261.167981] ? memfd_file_seals_ptr+0x150/0x150 [ 261.172763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.178128] ? trace_hardirqs_off_caller+0x6e/0x210 [ 261.183142] ? do_syscall_64+0x21/0x620 [ 261.187112] do_syscall_64+0xf9/0x620 [ 261.190909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.196091] RIP: 0033:0x465b09 [ 261.199282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.218177] RSP: 002b:00007f562c58ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.225880] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 261.233142] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da 05:49:13 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:13 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 261.240410] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 261.247676] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 261.255029] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 261.263124] erofs: unmounted for /dev/loop3 [ 261.269002] erofs: root inode @ nid 36 [ 261.279040] erofs: mounted on /dev/loop2 with opts: . 05:49:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x190, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 261.368719] FAULT_INJECTION: forcing a failure. [ 261.368719] name failslab, interval 1, probability 0, space 0, times 0 [ 261.380821] CPU: 1 PID: 17210 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 261.388711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.398169] Call Trace: [ 261.400759] dump_stack+0x1fc/0x2ef [ 261.404393] should_fail.cold+0xa/0xf [ 261.408202] ? setup_fault_attr+0x200/0x200 [ 261.412651] ? lock_acquire+0x170/0x3c0 [ 261.416624] __should_failslab+0x115/0x180 [ 261.420988] should_failslab+0x5/0x10 [ 261.424794] kmem_cache_alloc+0x277/0x370 [ 261.428954] __kernfs_new_node+0xd2/0x680 [ 261.433102] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 261.438026] ? __cpu_to_node+0x7b/0xa0 [ 261.442041] ? account_entity_enqueue+0x2e5/0x440 [ 261.446887] ? mark_held_locks+0xf0/0xf0 [ 261.451193] ? enqueue_entity+0xf86/0x3850 [ 261.455438] ? set_user_nice.part.0+0x3b9/0xab0 [ 261.460123] kernfs_create_dir_ns+0x9e/0x230 [ 261.464673] internal_create_group+0x1c1/0xb20 05:49:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 261.469429] ? sysfs_remove_link_from_group+0x70/0x70 [ 261.474638] ? lock_downgrade+0x720/0x720 [ 261.478816] lo_ioctl+0xf7c/0x20e0 [ 261.482377] ? loop_set_status64+0x110/0x110 [ 261.486807] blkdev_ioctl+0x5cb/0x1a80 [ 261.490701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.496323] ? blkpg_ioctl+0x9d0/0x9d0 [ 261.500213] ? mark_held_locks+0xf0/0xf0 [ 261.504392] ? mark_held_locks+0xf0/0xf0 [ 261.508453] ? debug_check_no_obj_freed+0x201/0x490 [ 261.513544] ? lock_downgrade+0x720/0x720 [ 261.517687] block_ioctl+0xe9/0x130 [ 261.521308] ? blkdev_fallocate+0x3f0/0x3f0 [ 261.525623] do_vfs_ioctl+0xcdb/0x12e0 [ 261.529519] ? lock_downgrade+0x720/0x720 [ 261.533789] ? check_preemption_disabled+0x41/0x280 [ 261.538895] ? ioctl_preallocate+0x200/0x200 [ 261.543452] ? __fget+0x356/0x510 [ 261.546907] ? do_dup2+0x450/0x450 [ 261.550442] ? do_sys_open+0x2bf/0x520 [ 261.554342] ksys_ioctl+0x9b/0xc0 [ 261.557802] __x64_sys_ioctl+0x6f/0xb0 [ 261.561686] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 261.566261] do_syscall_64+0xf9/0x620 [ 261.570073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.575318] RIP: 0033:0x4658c7 [ 261.578507] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.597538] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.605243] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 261.612594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 261.619858] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 261.627226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.634491] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 261.645972] erofs: unmounted for /dev/loop2 [ 261.647303] erofs: read_super, device -> /dev/loop5 [ 261.656472] erofs: options -> acl,noacl, [ 261.660985] erofs: root inode @ nid 36 [ 261.665446] erofs: mounted on /dev/loop5 with opts: acl. [ 261.681576] FAULT_INJECTION: forcing a failure. [ 261.681576] name failslab, interval 1, probability 0, space 0, times 0 [ 261.693072] CPU: 1 PID: 17218 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 261.701075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.710428] Call Trace: [ 261.713098] dump_stack+0x1fc/0x2ef [ 261.716728] should_fail.cold+0xa/0xf [ 261.720526] ? setup_fault_attr+0x200/0x200 [ 261.724850] ? lock_acquire+0x170/0x3c0 [ 261.728824] __should_failslab+0x115/0x180 [ 261.733057] should_failslab+0x5/0x10 [ 261.736853] kmem_cache_alloc+0x277/0x370 [ 261.741119] ? shmem_destroy_callback+0xb0/0xb0 [ 261.745848] shmem_alloc_inode+0x18/0x40 [ 261.749907] ? shmem_destroy_callback+0xb0/0xb0 [ 261.754575] alloc_inode+0x5d/0x180 [ 261.758196] new_inode+0x1d/0xf0 [ 261.761618] shmem_get_inode+0x96/0x8d0 [ 261.765591] __shmem_file_setup.part.0+0x7a/0x2b0 [ 261.770434] shmem_file_setup+0x61/0x90 [ 261.774409] __se_sys_memfd_create+0x26b/0x440 [ 261.779072] ? memfd_file_seals_ptr+0x150/0x150 [ 261.783737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.789096] ? trace_hardirqs_off_caller+0x6e/0x210 [ 261.794119] ? do_syscall_64+0x21/0x620 [ 261.798099] do_syscall_64+0xf9/0x620 [ 261.801892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.807076] RIP: 0033:0x465b09 [ 261.810260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.829159] RSP: 002b:00007f562c58ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.836865] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 261.844286] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 261.851554] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 261.858829] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 05:49:14 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 261.866107] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 261.885351] erofs: read_super, device -> /dev/loop1 [ 261.890526] erofs: options -> acl,noacl, [ 261.970196] erofs: read_super, device -> /dev/loop3 05:49:14 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 261.991947] erofs: options -> acl,noacl, [ 261.999838] erofs: unmounted for /dev/loop1 [ 262.000389] FAULT_INJECTION: forcing a failure. [ 262.000389] name failslab, interval 1, probability 0, space 0, times 0 [ 262.017471] erofs: unmounted for /dev/loop5 [ 262.034837] CPU: 0 PID: 17228 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 262.043041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.052403] Call Trace: [ 262.055008] dump_stack+0x1fc/0x2ef [ 262.058643] should_fail.cold+0xa/0xf [ 262.062445] ? setup_fault_attr+0x200/0x200 [ 262.066762] ? lock_acquire+0x170/0x3c0 [ 262.070828] __should_failslab+0x115/0x180 [ 262.075069] should_failslab+0x5/0x10 [ 262.078878] kmem_cache_alloc+0x277/0x370 [ 262.083034] __d_alloc+0x2b/0xa10 [ 262.086496] d_alloc_pseudo+0x19/0x70 [ 262.090429] alloc_file_pseudo+0xc6/0x250 [ 262.094672] ? alloc_file+0x4d0/0x4d0 [ 262.098491] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 262.104298] ? shmem_get_inode+0x44c/0x8d0 [ 262.108658] __shmem_file_setup.part.0+0x102/0x2b0 [ 262.113588] shmem_file_setup+0x61/0x90 [ 262.117562] __se_sys_memfd_create+0x26b/0x440 [ 262.122142] ? memfd_file_seals_ptr+0x150/0x150 [ 262.126886] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.132249] ? trace_hardirqs_off_caller+0x6e/0x210 [ 262.137264] ? do_syscall_64+0x21/0x620 [ 262.141239] do_syscall_64+0xf9/0x620 [ 262.145228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.150424] RIP: 0033:0x465b09 [ 262.153615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 262.172644] RSP: 002b:00007f562c58ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.180458] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 05:49:14 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 262.187721] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 262.194997] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 262.202362] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 262.209626] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 262.286564] erofs: read_super, device -> /dev/loop2 05:49:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 262.307541] erofs: read_super, device -> /dev/loop5 [ 262.315106] erofs: read_super, device -> /dev/loop4 [ 262.327729] erofs: options -> [ 262.333583] erofs: options -> acl,noacl, [ 262.347125] erofs: options -> [ 262.352402] erofs: unmounted for /dev/loop3 [ 262.355091] erofs: root inode @ nid 36 [ 262.358023] erofs: root inode @ nid 36 [ 262.364159] erofs: mounted on /dev/loop5 with opts: acl. [ 262.371450] erofs: blksize 1 isn't supported on this platform [ 262.393551] erofs: mounted on /dev/loop2 with opts: . [ 262.404789] FAULT_INJECTION: forcing a failure. [ 262.404789] name failslab, interval 1, probability 0, space 0, times 0 [ 262.418119] CPU: 0 PID: 17248 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 262.426227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.435602] Call Trace: [ 262.438365] dump_stack+0x1fc/0x2ef [ 262.442005] should_fail.cold+0xa/0xf [ 262.445818] ? setup_fault_attr+0x200/0x200 [ 262.450145] ? lock_acquire+0x170/0x3c0 [ 262.454132] __should_failslab+0x115/0x180 [ 262.458524] should_failslab+0x5/0x10 [ 262.462457] kmem_cache_alloc+0x277/0x370 [ 262.466612] __alloc_file+0x21/0x330 [ 262.470332] alloc_empty_file+0x6d/0x170 [ 262.474388] alloc_file+0x5e/0x4d0 [ 262.477930] alloc_file_pseudo+0x165/0x250 [ 262.483201] ? alloc_file+0x4d0/0x4d0 [ 262.487012] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 262.492647] ? shmem_get_inode+0x44c/0x8d0 [ 262.496887] __shmem_file_setup.part.0+0x102/0x2b0 [ 262.501818] shmem_file_setup+0x61/0x90 [ 262.505803] __se_sys_memfd_create+0x26b/0x440 [ 262.510407] ? memfd_file_seals_ptr+0x150/0x150 [ 262.515081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.520643] ? trace_hardirqs_off_caller+0x6e/0x210 [ 262.525804] ? do_syscall_64+0x21/0x620 [ 262.529796] do_syscall_64+0xf9/0x620 [ 262.533606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.538916] RIP: 0033:0x465b09 05:49:14 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 262.542118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 262.561777] RSP: 002b:00007f562c58ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.569505] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 262.576785] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 262.584149] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 262.591961] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 262.599351] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 262.659487] FAULT_INJECTION: forcing a failure. [ 262.659487] name failslab, interval 1, probability 0, space 0, times 0 [ 262.664455] FAULT_INJECTION: forcing a failure. [ 262.664455] name failslab, interval 1, probability 0, space 0, times 0 [ 262.674030] CPU: 0 PID: 17249 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 262.690211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.699583] Call Trace: [ 262.702183] dump_stack+0x1fc/0x2ef [ 262.705814] should_fail.cold+0xa/0xf [ 262.709618] ? setup_fault_attr+0x200/0x200 [ 262.713949] ? lock_acquire+0x170/0x3c0 [ 262.717929] __should_failslab+0x115/0x180 [ 262.722179] should_failslab+0x5/0x10 [ 262.725985] kmem_cache_alloc+0x277/0x370 [ 262.730149] __kernfs_new_node+0xd2/0x680 [ 262.734303] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 262.739061] ? kernfs_activate+0x2c/0x1d0 [ 262.743212] ? lock_downgrade+0x720/0x720 [ 262.747359] ? kernfs_add_one+0x51/0x4c0 [ 262.751424] ? __mutex_add_waiter+0x160/0x160 [ 262.755924] ? __mutex_unlock_slowpath+0xea/0x610 [ 262.760776] kernfs_new_node+0x92/0x120 [ 262.764882] __kernfs_create_file+0x51/0x340 [ 262.769384] sysfs_add_file_mode_ns+0x226/0x540 [ 262.774064] internal_create_group+0x355/0xb20 [ 262.778653] ? sysfs_remove_link_from_group+0x70/0x70 [ 262.783846] ? lock_downgrade+0x720/0x720 [ 262.788003] lo_ioctl+0xf7c/0x20e0 [ 262.791656] ? loop_set_status64+0x110/0x110 [ 262.796073] blkdev_ioctl+0x5cb/0x1a80 [ 262.799964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.805334] ? blkpg_ioctl+0x9d0/0x9d0 [ 262.809225] ? mark_held_locks+0xf0/0xf0 [ 262.813377] ? mark_held_locks+0xf0/0xf0 [ 262.817447] ? debug_check_no_obj_freed+0x201/0x490 [ 262.822587] ? lock_downgrade+0x720/0x720 [ 262.826736] block_ioctl+0xe9/0x130 [ 262.830362] ? blkdev_fallocate+0x3f0/0x3f0 [ 262.834695] do_vfs_ioctl+0xcdb/0x12e0 [ 262.838592] ? lock_downgrade+0x720/0x720 [ 262.842925] ? check_preemption_disabled+0x41/0x280 [ 262.847958] ? ioctl_preallocate+0x200/0x200 [ 262.852387] ? __fget+0x356/0x510 [ 262.855857] ? do_dup2+0x450/0x450 [ 262.859408] ? do_sys_open+0x2bf/0x520 [ 262.863494] ksys_ioctl+0x9b/0xc0 [ 262.867021] __x64_sys_ioctl+0x6f/0xb0 [ 262.870926] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 262.875521] do_syscall_64+0xf9/0x620 [ 262.879329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.884772] RIP: 0033:0x4658c7 [ 262.887970] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 262.906985] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.914696] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 262.921967] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 262.929236] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 262.936511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.943786] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 262.951084] CPU: 1 PID: 17256 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 262.959111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.968634] Call Trace: [ 262.971258] dump_stack+0x1fc/0x2ef [ 262.974911] should_fail.cold+0xa/0xf [ 262.978741] ? setup_fault_attr+0x200/0x200 [ 262.983215] ? lock_acquire+0x170/0x3c0 [ 262.987222] __should_failslab+0x115/0x180 [ 262.991485] should_failslab+0x5/0x10 [ 262.995306] kmem_cache_alloc_trace+0x284/0x380 [ 262.998027] erofs: read_super, device -> /dev/loop1 [ 262.999999] apparmor_file_alloc_security+0x394/0xad0 [ 263.000020] ? apparmor_file_receive+0x160/0x160 [ 263.000037] ? __alloc_file+0x21/0x330 [ 263.000055] security_file_alloc+0x40/0x90 [ 263.023159] __alloc_file+0xc9/0x330 [ 263.026909] alloc_empty_file+0x6d/0x170 [ 263.031112] alloc_file+0x5e/0x4d0 [ 263.034686] alloc_file_pseudo+0x165/0x250 [ 263.035174] erofs: options -> acl,noacl, [ 263.038943] ? alloc_file+0x4d0/0x4d0 [ 263.038962] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 263.038978] ? shmem_get_inode+0x44c/0x8d0 05:49:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x28c, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 263.038997] __shmem_file_setup.part.0+0x102/0x2b0 [ 263.039017] shmem_file_setup+0x61/0x90 [ 263.039032] __se_sys_memfd_create+0x26b/0x440 [ 263.039046] ? memfd_file_seals_ptr+0x150/0x150 [ 263.039059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.039074] ? trace_hardirqs_off_caller+0x6e/0x210 [ 263.039089] ? do_syscall_64+0x21/0x620 [ 263.039107] do_syscall_64+0xf9/0x620 [ 263.039119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.039130] RIP: 0033:0x465b09 05:49:15 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 263.039145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.039152] RSP: 002b:00007f562c58ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.039166] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000465b09 [ 263.039173] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00000000004af4da [ 263.039181] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 263.039189] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 263.039197] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 263.157467] erofs: unmounted for /dev/loop5 [ 263.195146] erofs: read_super, device -> /dev/loop3 05:49:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 263.257357] erofs: read_super, device -> /dev/loop4 [ 263.262725] erofs: options -> [ 263.267827] erofs: blksize 1 isn't supported on this platform [ 263.277193] erofs: options -> acl,noacl, 05:49:15 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 263.307609] erofs: unmounted for /dev/loop2 [ 263.307780] FAULT_INJECTION: forcing a failure. [ 263.307780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 263.335619] erofs: unmounted for /dev/loop1 [ 263.353634] CPU: 1 PID: 17270 Comm: syz-executor.0 Not tainted 4.19.172-syzkaller #0 [ 263.361737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.371092] Call Trace: [ 263.373687] dump_stack+0x1fc/0x2ef [ 263.377312] should_fail.cold+0xa/0xf [ 263.381110] ? lock_acquire+0x170/0x3c0 [ 263.385075] ? setup_fault_attr+0x200/0x200 [ 263.389590] __alloc_pages_nodemask+0x239/0x2890 [ 263.394340] ? __lock_acquire+0x6de/0x3ff0 [ 263.398574] ? static_obj+0x50/0x50 [ 263.402337] ? __lock_acquire+0x6de/0x3ff0 [ 263.406571] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 263.411695] ? __lock_acquire+0x6de/0x3ff0 [ 263.416023] ? deref_stack_reg+0x134/0x1d0 [ 263.420373] ? mark_held_locks+0xf0/0xf0 [ 263.424535] ? mark_held_locks+0xf0/0xf0 [ 263.428719] ? unwind_next_frame+0x10a9/0x1c60 [ 263.433296] alloc_pages_vma+0xf2/0x780 [ 263.437452] shmem_alloc_page+0x11c/0x1f0 [ 263.441595] ? shmem_swapin+0x220/0x220 [ 263.445747] ? percpu_counter_add_batch+0x126/0x180 [ 263.450762] ? __vm_enough_memory+0x316/0x650 [ 263.455374] shmem_alloc_and_acct_page+0x15a/0x850 [ 263.460303] shmem_getpage_gfp+0x4e9/0x37f0 [ 263.464764] ? shmem_alloc_and_acct_page+0x850/0x850 [ 263.469864] ? mark_held_locks+0xa6/0xf0 [ 263.473925] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 263.479124] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 263.484436] shmem_write_begin+0xff/0x1e0 [ 263.488705] generic_perform_write+0x1f8/0x4d0 [ 263.493292] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 263.497972] ? current_time+0x1c0/0x1c0 [ 263.501950] ? lock_acquire+0x170/0x3c0 [ 263.505924] __generic_file_write_iter+0x24b/0x610 [ 263.511094] generic_file_write_iter+0x3f8/0x730 [ 263.515867] __vfs_write+0x51b/0x770 [ 263.519726] ? kernel_read+0x110/0x110 [ 263.523616] ? check_preemption_disabled+0x41/0x280 [ 263.528635] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 263.533651] vfs_write+0x1f3/0x540 [ 263.537198] __x64_sys_pwrite64+0x1f7/0x250 [ 263.541520] ? ksys_pwrite64+0x1a0/0x1a0 [ 263.545586] ? trace_hardirqs_off_caller+0x6e/0x210 [ 263.550829] ? do_syscall_64+0x21/0x620 [ 263.554803] do_syscall_64+0xf9/0x620 [ 263.558602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.563787] RIP: 0033:0x4191a7 [ 263.566981] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 263.586030] RSP: 002b:00007f562c58ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 263.593853] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004191a7 [ 263.601121] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 05:49:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 263.608387] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 263.615741] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 263.623011] R13: 0000000000000004 R14: 0000000020000040 R15: 0000000000000000 [ 263.632164] erofs: unmounted for /dev/loop3 [ 263.775535] erofs: read_super, device -> /dev/loop0 [ 263.775999] erofs: read_super, device -> /dev/loop2 [ 263.786272] erofs: options -> [ 263.801864] erofs: read_super, device -> /dev/loop4 [ 263.807084] erofs: root inode @ nid 36 [ 263.811352] erofs: options -> [ 263.812192] erofs: options -> [ 263.814930] erofs: mounted on /dev/loop2 with opts: . [ 263.826147] erofs: blksize 1 isn't supported on this platform [ 263.836796] erofs: read_super, device -> /dev/loop5 [ 263.836803] erofs: options -> acl,noacl, [ 263.837189] erofs: root inode @ nid 36 [ 263.851990] erofs: mounted on /dev/loop5 with opts: acl. [ 263.866494] erofs: cannot find valid erofs superblock 05:49:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 263.912764] erofs: unmounted for /dev/loop5 [ 263.922676] erofs: unmounted for /dev/loop2 [ 263.951536] FAULT_INJECTION: forcing a failure. [ 263.951536] name failslab, interval 1, probability 0, space 0, times 0 [ 263.963991] CPU: 1 PID: 17294 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 263.971921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.981274] Call Trace: [ 263.984081] dump_stack+0x1fc/0x2ef [ 263.987706] should_fail.cold+0xa/0xf [ 263.991639] ? setup_fault_attr+0x200/0x200 [ 263.996062] ? lock_acquire+0x170/0x3c0 [ 264.000034] __should_failslab+0x115/0x180 [ 264.004482] should_failslab+0x5/0x10 [ 264.008407] kmem_cache_alloc+0x277/0x370 [ 264.012574] __kernfs_new_node+0xd2/0x680 [ 264.016844] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 264.021741] ? __mutex_unlock_slowpath+0xea/0x610 [ 264.026862] ? wait_for_completion_io+0x10/0x10 [ 264.031531] ? kernfs_next_descendant_post+0x19c/0x290 [ 264.036929] kernfs_new_node+0x92/0x120 [ 264.040904] __kernfs_create_file+0x51/0x340 [ 264.045427] sysfs_add_file_mode_ns+0x226/0x540 [ 264.050238] internal_create_group+0x355/0xb20 [ 264.054825] ? sysfs_remove_link_from_group+0x70/0x70 [ 264.060011] ? lock_downgrade+0x720/0x720 [ 264.064169] lo_ioctl+0xf7c/0x20e0 [ 264.067707] ? loop_set_status64+0x110/0x110 [ 264.072276] blkdev_ioctl+0x5cb/0x1a80 [ 264.076164] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.081631] ? blkpg_ioctl+0x9d0/0x9d0 [ 264.085514] ? mark_held_locks+0xf0/0xf0 [ 264.089569] ? mark_held_locks+0xf0/0xf0 [ 264.093636] ? debug_check_no_obj_freed+0x201/0x490 [ 264.098660] ? lock_downgrade+0x720/0x720 [ 264.102802] block_ioctl+0xe9/0x130 [ 264.106425] ? blkdev_fallocate+0x3f0/0x3f0 [ 264.110845] do_vfs_ioctl+0xcdb/0x12e0 [ 264.114747] ? lock_downgrade+0x720/0x720 [ 264.118891] ? check_preemption_disabled+0x41/0x280 [ 264.124046] ? ioctl_preallocate+0x200/0x200 [ 264.128457] ? __fget+0x356/0x510 [ 264.131909] ? do_dup2+0x450/0x450 [ 264.135443] ? do_sys_open+0x2bf/0x520 [ 264.139337] ksys_ioctl+0x9b/0xc0 [ 264.142799] __x64_sys_ioctl+0x6f/0xb0 [ 264.146684] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 264.151359] do_syscall_64+0xf9/0x620 [ 264.155200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.160530] RIP: 0033:0x4658c7 [ 264.163726] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.182794] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.190689] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 264.197962] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.205224] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 05:49:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 264.212653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 264.219928] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 264.307903] erofs: read_super, device -> /dev/loop3 [ 264.307907] erofs: read_super, device -> /dev/loop1 [ 264.307918] erofs: options -> acl,noacl, [ 264.313069] erofs: options -> acl,noacl, [ 264.342854] erofs: read_super, device -> /dev/loop5 [ 264.368352] erofs: read_super, device -> /dev/loop4 [ 264.375069] erofs: options -> [ 264.388429] erofs: blksize 1 isn't supported on this platform [ 264.403182] erofs: read_super, device -> /dev/loop2 [ 264.411414] erofs: options -> acl,noacl, [ 264.415669] erofs: options -> 05:49:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:16 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 264.425905] erofs: root inode @ nid 36 [ 264.431097] erofs: unmounted for /dev/loop3 [ 264.438880] erofs: unmounted for /dev/loop1 [ 264.449072] erofs: root inode @ nid 36 [ 264.455605] erofs: mounted on /dev/loop5 with opts: acl. [ 264.459513] erofs: mounted on /dev/loop2 with opts: . 05:49:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 264.510145] erofs: read_super, device -> /dev/loop4 [ 264.515485] erofs: options -> [ 264.522282] erofs: read_super, device -> /dev/loop0 [ 264.541981] erofs: options -> [ 264.550129] erofs: root inode @ nid 36 [ 264.554415] erofs: unmounted for /dev/loop5 05:49:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1404, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 264.556435] erofs: blksize 1 isn't supported on this platform [ 264.565483] erofs: mounted on /dev/loop0 with opts: . [ 264.579792] erofs: read_super, device -> /dev/loop3 [ 264.585153] erofs: options -> acl,noacl, [ 264.606336] erofs: unmounted for /dev/loop2 05:49:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x407, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 264.627797] erofs: unmounted for /dev/loop0 [ 264.702504] FAULT_INJECTION: forcing a failure. [ 264.702504] name failslab, interval 1, probability 0, space 0, times 0 [ 264.714200] CPU: 0 PID: 17331 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 264.722102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.731575] Call Trace: [ 264.734321] dump_stack+0x1fc/0x2ef [ 264.738127] should_fail.cold+0xa/0xf [ 264.741944] ? setup_fault_attr+0x200/0x200 [ 264.746491] ? lock_acquire+0x170/0x3c0 [ 264.750467] __should_failslab+0x115/0x180 [ 264.754705] should_failslab+0x5/0x10 [ 264.758514] kmem_cache_alloc+0x277/0x370 [ 264.762827] __kernfs_new_node+0xd2/0x680 [ 264.766988] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 264.771753] ? __mutex_unlock_slowpath+0xea/0x610 [ 264.776594] ? wait_for_completion_io+0x10/0x10 [ 264.781277] ? kernfs_next_descendant_post+0x19c/0x290 [ 264.786697] kernfs_new_node+0x92/0x120 [ 264.790797] __kernfs_create_file+0x51/0x340 [ 264.795356] sysfs_add_file_mode_ns+0x226/0x540 [ 264.800042] internal_create_group+0x355/0xb20 [ 264.804769] ? sysfs_remove_link_from_group+0x70/0x70 [ 264.810175] ? lock_downgrade+0x720/0x720 [ 264.814336] lo_ioctl+0xf7c/0x20e0 [ 264.817897] ? loop_set_status64+0x110/0x110 [ 264.822324] blkdev_ioctl+0x5cb/0x1a80 [ 264.826228] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.831603] ? blkpg_ioctl+0x9d0/0x9d0 [ 264.835513] ? mark_held_locks+0xf0/0xf0 [ 264.839586] ? mark_held_locks+0xf0/0xf0 [ 264.843662] ? debug_check_no_obj_freed+0x201/0x490 [ 264.848692] ? lock_downgrade+0x720/0x720 [ 264.852855] block_ioctl+0xe9/0x130 [ 264.856481] ? blkdev_fallocate+0x3f0/0x3f0 [ 264.860815] do_vfs_ioctl+0xcdb/0x12e0 [ 264.864713] ? lock_downgrade+0x720/0x720 [ 264.868861] ? check_preemption_disabled+0x41/0x280 [ 264.873993] ? ioctl_preallocate+0x200/0x200 [ 264.878419] ? __fget+0x356/0x510 [ 264.881905] ? do_dup2+0x450/0x450 [ 264.885456] ? do_sys_open+0x2bf/0x520 [ 264.889514] ksys_ioctl+0x9b/0xc0 [ 264.893044] __x64_sys_ioctl+0x6f/0xb0 [ 264.896930] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 264.901523] do_syscall_64+0xf9/0x620 [ 264.905331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.910515] RIP: 0033:0x4658c7 [ 264.913702] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.932610] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.940335] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 05:49:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf803000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 264.947864] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.955156] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 264.962431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 264.969847] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 264.995636] erofs: unmounted for /dev/loop3 [ 265.052393] erofs: read_super, device -> /dev/loop5 [ 265.057606] erofs: read_super, device -> /dev/loop1 [ 265.057615] erofs: options -> acl,noacl, [ 265.066953] erofs: options -> acl,noacl, [ 265.072079] erofs: root inode @ nid 36 [ 265.076333] erofs: mounted on /dev/loop5 with opts: acl. 05:49:17 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 265.196747] erofs: unmounted for /dev/loop1 [ 265.201241] erofs: unmounted for /dev/loop5 [ 265.223010] erofs: read_super, device -> /dev/loop0 [ 265.233563] erofs: read_super, device -> /dev/loop2 [ 265.239117] erofs: options -> [ 265.255903] erofs: root inode @ nid 36 [ 265.261160] erofs: options -> [ 265.273002] erofs: root inode @ nid 36 [ 265.274492] erofs: mounted on /dev/loop2 with opts: . [ 265.280845] erofs: read_super, device -> /dev/loop4 [ 265.295287] erofs: options -> [ 265.296586] erofs: mounted on /dev/loop0 with opts: . [ 265.304894] erofs: blksize 1 isn't supported on this platform [ 265.319483] erofs: read_super, device -> /dev/loop3 [ 265.324732] erofs: options -> acl,noacl, [ 265.370257] FAULT_INJECTION: forcing a failure. [ 265.370257] name failslab, interval 1, probability 0, space 0, times 0 [ 265.382052] CPU: 0 PID: 17371 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 265.389950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.399302] Call Trace: [ 265.401882] dump_stack+0x1fc/0x2ef [ 265.405545] should_fail.cold+0xa/0xf [ 265.409345] ? setup_fault_attr+0x200/0x200 [ 265.413663] ? lock_acquire+0x170/0x3c0 [ 265.417637] __should_failslab+0x115/0x180 [ 265.421866] should_failslab+0x5/0x10 [ 265.425649] kmem_cache_alloc+0x277/0x370 [ 265.429804] __kernfs_new_node+0xd2/0x680 [ 265.433952] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 265.438762] ? __mutex_unlock_slowpath+0xea/0x610 [ 265.443596] ? wait_for_completion_io+0x10/0x10 [ 265.448259] ? kernfs_next_descendant_post+0x19c/0x290 [ 265.453533] kernfs_new_node+0x92/0x120 [ 265.457500] __kernfs_create_file+0x51/0x340 [ 265.461918] sysfs_add_file_mode_ns+0x226/0x540 [ 265.466589] internal_create_group+0x355/0xb20 [ 265.471181] ? sysfs_remove_link_from_group+0x70/0x70 [ 265.476377] ? lock_downgrade+0x720/0x720 [ 265.480543] lo_ioctl+0xf7c/0x20e0 [ 265.484086] ? loop_set_status64+0x110/0x110 [ 265.488494] blkdev_ioctl+0x5cb/0x1a80 [ 265.492385] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.497757] ? blkpg_ioctl+0x9d0/0x9d0 [ 265.501641] ? mark_held_locks+0xf0/0xf0 [ 265.505690] ? mark_held_locks+0xf0/0xf0 [ 265.509757] ? debug_check_no_obj_freed+0x201/0x490 [ 265.514786] ? lock_downgrade+0x720/0x720 [ 265.518938] block_ioctl+0xe9/0x130 [ 265.522554] ? blkdev_fallocate+0x3f0/0x3f0 [ 265.526864] do_vfs_ioctl+0xcdb/0x12e0 [ 265.530762] ? lock_downgrade+0x720/0x720 [ 265.534909] ? check_preemption_disabled+0x41/0x280 [ 265.539926] ? ioctl_preallocate+0x200/0x200 [ 265.544345] ? __fget+0x356/0x510 [ 265.547807] ? do_dup2+0x450/0x450 [ 265.551348] ? do_sys_open+0x2bf/0x520 [ 265.555235] ksys_ioctl+0x9b/0xc0 [ 265.558672] __x64_sys_ioctl+0x6f/0xb0 [ 265.562595] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 265.567162] do_syscall_64+0xf9/0x620 [ 265.570962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.576145] RIP: 0033:0x4658c7 [ 265.579318] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.598263] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.605963] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 265.613219] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:49:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf903000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1504, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 265.620475] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 265.627727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 265.634983] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 265.649141] erofs: unmounted for /dev/loop2 [ 265.649229] erofs: read_super, device -> /dev/loop5 [ 265.678117] erofs: unmounted for /dev/loop3 [ 265.681237] erofs: read_super, device -> /dev/loop4 [ 265.682745] erofs: unmounted for /dev/loop0 [ 265.687640] erofs: options -> [ 265.700898] erofs: options -> acl,noacl, [ 265.704626] erofs: blksize 1 isn't supported on this platform [ 265.710701] erofs: root inode @ nid 36 [ 265.715490] erofs: read_super, device -> /dev/loop1 [ 265.728175] erofs: mounted on /dev/loop5 with opts: acl. [ 265.729745] erofs: options -> acl,noacl, 05:49:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x408, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:18 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 265.866661] erofs: unmounted for /dev/loop5 [ 265.871140] erofs: unmounted for /dev/loop1 [ 265.955693] erofs: read_super, device -> /dev/loop2 [ 265.961170] erofs: read_super, device -> /dev/loop3 [ 265.963142] erofs: read_super, device -> /dev/loop0 [ 265.979397] erofs: options -> [ 265.982171] erofs: options -> [ 265.982778] erofs: options -> acl,noacl, [ 265.991717] erofs: root inode @ nid 36 [ 266.000341] erofs: read_super, device -> /dev/loop4 [ 266.005380] erofs: options -> [ 266.013788] erofs: root inode @ nid 36 [ 266.033284] erofs: mounted on /dev/loop2 with opts: . [ 266.045701] erofs: blksize 1 isn't supported on this platform 05:49:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 266.056920] erofs: mounted on /dev/loop0 with opts: . [ 266.076601] FAULT_INJECTION: forcing a failure. [ 266.076601] name failslab, interval 1, probability 0, space 0, times 0 [ 266.089019] CPU: 1 PID: 17410 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 266.090493] erofs: unmounted for /dev/loop3 [ 266.096919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.096927] Call Trace: [ 266.096953] dump_stack+0x1fc/0x2ef [ 266.096976] should_fail.cold+0xa/0xf [ 266.120585] ? setup_fault_attr+0x200/0x200 [ 266.124911] ? lock_acquire+0x170/0x3c0 [ 266.128875] __should_failslab+0x115/0x180 [ 266.133101] should_failslab+0x5/0x10 [ 266.136957] kmem_cache_alloc+0x277/0x370 [ 266.141107] __kernfs_new_node+0xd2/0x680 [ 266.145242] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 266.149983] ? __mutex_unlock_slowpath+0xea/0x610 [ 266.154919] ? wait_for_completion_io+0x10/0x10 [ 266.159578] ? kernfs_next_descendant_post+0x19c/0x290 [ 266.164857] kernfs_new_node+0x92/0x120 [ 266.168824] __kernfs_create_file+0x51/0x340 [ 266.173221] sysfs_add_file_mode_ns+0x226/0x540 [ 266.177896] internal_create_group+0x355/0xb20 [ 266.182478] ? sysfs_remove_link_from_group+0x70/0x70 [ 266.187663] ? lock_downgrade+0x720/0x720 [ 266.191802] lo_ioctl+0xf7c/0x20e0 [ 266.195373] ? loop_set_status64+0x110/0x110 [ 266.199771] blkdev_ioctl+0x5cb/0x1a80 [ 266.203644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.208991] ? blkpg_ioctl+0x9d0/0x9d0 [ 266.212862] ? mark_held_locks+0xf0/0xf0 [ 266.216911] ? mark_held_locks+0xf0/0xf0 [ 266.220961] ? debug_check_no_obj_freed+0x201/0x490 [ 266.225964] ? lock_downgrade+0x720/0x720 [ 266.230109] block_ioctl+0xe9/0x130 [ 266.233717] ? blkdev_fallocate+0x3f0/0x3f0 [ 266.238023] do_vfs_ioctl+0xcdb/0x12e0 [ 266.241957] ? lock_downgrade+0x720/0x720 [ 266.246088] ? check_preemption_disabled+0x41/0x280 [ 266.251140] ? ioctl_preallocate+0x200/0x200 [ 266.255533] ? __fget+0x356/0x510 [ 266.258971] ? do_dup2+0x450/0x450 [ 266.262493] ? do_sys_open+0x2bf/0x520 [ 266.266366] ksys_ioctl+0x9b/0xc0 [ 266.269803] __x64_sys_ioctl+0x6f/0xb0 [ 266.273673] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 266.278256] do_syscall_64+0xf9/0x620 [ 266.282042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.287237] RIP: 0033:0x4658c7 [ 266.290413] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.309296] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.316990] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 266.324251] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.331512] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 266.338767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 266.346018] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1604, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 266.359643] erofs: read_super, device -> /dev/loop5 [ 266.370061] erofs: options -> acl,noacl, [ 266.376289] erofs: root inode @ nid 36 [ 266.380411] erofs: mounted on /dev/loop5 with opts: acl. 05:49:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 266.424909] erofs: unmounted for /dev/loop2 [ 266.430064] erofs: read_super, device -> /dev/loop1 [ 266.437482] erofs: options -> acl,noacl, [ 266.462857] erofs: unmounted for /dev/loop5 05:49:18 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 266.482896] erofs: unmounted for /dev/loop0 [ 266.493113] erofs: read_super, device -> /dev/loop4 [ 266.498157] erofs: options -> [ 266.514814] erofs: blksize 1 isn't supported on this platform [ 266.522711] erofs: unmounted for /dev/loop1 05:49:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x409, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 266.675821] erofs: read_super, device -> /dev/loop3 [ 266.681170] erofs: options -> acl,noacl, [ 266.712887] erofs: unmounted for /dev/loop3 [ 266.729401] erofs: read_super, device -> /dev/loop2 [ 266.729417] erofs: read_super, device -> /dev/loop5 [ 266.734481] erofs: options -> [ 266.751105] erofs: read_super, device -> /dev/loop0 [ 266.767747] erofs: options -> acl,noacl, [ 266.787159] erofs: root inode @ nid 36 [ 266.793964] erofs: options -> [ 266.821034] FAULT_INJECTION: forcing a failure. [ 266.821034] name failslab, interval 1, probability 0, space 0, times 0 [ 266.821783] erofs: mounted on /dev/loop2 with opts: . [ 266.835443] erofs: root inode @ nid 36 [ 266.841213] erofs: root inode @ nid 36 [ 266.845767] erofs: mounted on /dev/loop0 with opts: . [ 266.852071] CPU: 0 PID: 17447 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 266.859003] erofs: mounted on /dev/loop5 with opts: acl. [ 266.859964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.859969] Call Trace: [ 266.859995] dump_stack+0x1fc/0x2ef [ 266.860015] should_fail.cold+0xa/0xf [ 266.860035] ? setup_fault_attr+0x200/0x200 [ 266.889095] ? lock_acquire+0x170/0x3c0 [ 266.893072] ? dev_uevent_filter+0xd0/0xd0 [ 266.897292] __should_failslab+0x115/0x180 [ 266.901513] should_failslab+0x5/0x10 [ 266.905299] kmem_cache_alloc_trace+0x284/0x380 [ 266.909983] ? dev_uevent_filter+0xd0/0xd0 [ 266.914214] kobject_uevent_env+0x236/0x14a0 [ 266.918690] lo_ioctl+0xff9/0x20e0 [ 266.922240] ? loop_set_status64+0x110/0x110 [ 266.926662] blkdev_ioctl+0x5cb/0x1a80 [ 266.930563] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.935987] ? blkpg_ioctl+0x9d0/0x9d0 [ 266.939874] ? mark_held_locks+0xf0/0xf0 [ 266.943944] ? mark_held_locks+0xf0/0xf0 [ 266.948024] ? debug_check_no_obj_freed+0x201/0x490 [ 266.953045] ? lock_downgrade+0x720/0x720 [ 266.957201] block_ioctl+0xe9/0x130 [ 266.960828] ? blkdev_fallocate+0x3f0/0x3f0 [ 266.965146] do_vfs_ioctl+0xcdb/0x12e0 [ 266.969031] ? lock_downgrade+0x720/0x720 [ 266.973174] ? check_preemption_disabled+0x41/0x280 [ 266.978176] ? ioctl_preallocate+0x200/0x200 [ 266.982578] ? __fget+0x356/0x510 [ 266.986078] ? do_dup2+0x450/0x450 [ 266.989617] ? do_sys_open+0x2bf/0x520 [ 266.993567] ksys_ioctl+0x9b/0xc0 [ 266.997008] __x64_sys_ioctl+0x6f/0xb0 [ 267.000894] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 267.005489] do_syscall_64+0xf9/0x620 [ 267.009297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.014574] RIP: 0033:0x4658c7 [ 267.017754] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.036646] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.044345] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 267.051610] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.058883] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 267.066144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 267.073405] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 267.120099] erofs: read_super, device -> /dev/loop1 [ 267.127515] erofs: read_super, device -> /dev/loop4 [ 267.141211] erofs: options -> [ 267.144564] erofs: options -> acl,noacl, [ 267.149955] erofs: read_super, device -> /dev/loop3 [ 267.157443] erofs: options -> acl,noacl, 05:49:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1704, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 267.190939] erofs: blksize 1 isn't supported on this platform [ 267.227307] erofs: unmounted for /dev/loop0 05:49:19 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 267.248196] erofs: unmounted for /dev/loop5 [ 267.252844] erofs: unmounted for /dev/loop2 [ 267.260134] erofs: unmounted for /dev/loop3 [ 267.274082] erofs: unmounted for /dev/loop1 [ 267.412526] erofs: read_super, device -> /dev/loop0 [ 267.417600] erofs: options -> [ 267.433538] erofs: root inode @ nid 36 [ 267.437960] erofs: mounted on /dev/loop0 with opts: . 05:49:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 267.481509] erofs: read_super, device -> /dev/loop4 [ 267.491747] erofs: options -> [ 267.498654] erofs: read_super, device -> /dev/loop3 [ 267.507546] erofs: options -> acl,noacl, [ 267.515233] erofs: blksize 1 isn't supported on this platform [ 267.517655] erofs: read_super, device -> /dev/loop5 [ 267.528055] erofs: read_super, device -> /dev/loop2 [ 267.533228] erofs: unmounted for /dev/loop0 [ 267.534449] erofs: options -> acl,noacl, [ 267.544395] erofs: options -> [ 267.548770] erofs: root inode @ nid 36 [ 267.554032] erofs: root inode @ nid 36 [ 267.558280] erofs: mounted on /dev/loop2 with opts: . [ 267.563345] erofs: mounted on /dev/loop5 with opts: acl. [ 267.582425] FAULT_INJECTION: forcing a failure. [ 267.582425] name failslab, interval 1, probability 0, space 0, times 0 [ 267.593771] CPU: 0 PID: 17487 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 267.601655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.611003] Call Trace: [ 267.613593] dump_stack+0x1fc/0x2ef [ 267.617207] should_fail.cold+0xa/0xf [ 267.620996] ? setup_fault_attr+0x200/0x200 [ 267.625304] ? lock_acquire+0x170/0x3c0 [ 267.629279] __should_failslab+0x115/0x180 [ 267.633511] should_failslab+0x5/0x10 [ 267.637299] __kmalloc+0x2ab/0x3c0 [ 267.640836] ? kobject_get_path+0xbf/0x240 [ 267.645067] kobject_get_path+0xbf/0x240 [ 267.649142] kobject_uevent_env+0x25c/0x14a0 [ 267.653552] lo_ioctl+0xff9/0x20e0 [ 267.657085] ? loop_set_status64+0x110/0x110 [ 267.661485] blkdev_ioctl+0x5cb/0x1a80 [ 267.665364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.670735] ? blkpg_ioctl+0x9d0/0x9d0 [ 267.674617] ? mark_held_locks+0xf0/0xf0 [ 267.678661] ? mark_held_locks+0xf0/0xf0 [ 267.682711] ? debug_check_no_obj_freed+0x201/0x490 [ 267.687726] ? lock_downgrade+0x720/0x720 [ 267.691863] block_ioctl+0xe9/0x130 [ 267.695489] ? blkdev_fallocate+0x3f0/0x3f0 [ 267.699816] do_vfs_ioctl+0xcdb/0x12e0 [ 267.703805] ? lock_downgrade+0x720/0x720 [ 267.707939] ? check_preemption_disabled+0x41/0x280 [ 267.713005] ? ioctl_preallocate+0x200/0x200 [ 267.717421] ? __fget+0x356/0x510 [ 267.720859] ? do_dup2+0x450/0x450 [ 267.724384] ? do_sys_open+0x2bf/0x520 [ 267.728272] ksys_ioctl+0x9b/0xc0 [ 267.731712] __x64_sys_ioctl+0x6f/0xb0 [ 267.735588] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 267.740165] do_syscall_64+0xf9/0x620 [ 267.743954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.749125] RIP: 0033:0x4658c7 [ 267.752314] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.771218] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.778930] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 267.786194] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.793459] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 267.800722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 267.807974] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1804, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 267.864931] erofs: read_super, device -> /dev/loop1 [ 267.870770] erofs: options -> acl,noacl, 05:49:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40a, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:20 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 267.940429] erofs: read_super, device -> /dev/loop0 [ 267.943923] erofs: unmounted for /dev/loop2 [ 267.950270] erofs: unmounted for /dev/loop3 [ 267.952413] erofs: options -> [ 267.963456] erofs: root inode @ nid 36 [ 267.967698] erofs: mounted on /dev/loop0 with opts: . [ 267.973133] erofs: unmounted for /dev/loop5 [ 267.987999] erofs: unmounted for /dev/loop1 [ 268.193440] erofs: read_super, device -> /dev/loop5 [ 268.198502] erofs: options -> acl,noacl, [ 268.208009] erofs: read_super, device -> /dev/loop2 [ 268.213519] erofs: read_super, device -> /dev/loop3 [ 268.213719] erofs: read_super, device -> /dev/loop4 [ 268.218541] erofs: options -> acl,noacl, [ 268.238792] erofs: options -> [ 268.243410] erofs: root inode @ nid 36 [ 268.256788] erofs: blksize 1 isn't supported on this platform [ 268.281283] erofs: mounted on /dev/loop5 with opts: acl. 05:49:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 268.307571] erofs: options -> [ 268.308724] FAULT_INJECTION: forcing a failure. [ 268.308724] name failslab, interval 1, probability 0, space 0, times 0 [ 268.323495] erofs: unmounted for /dev/loop0 [ 268.332860] erofs: root inode @ nid 36 [ 268.334318] CPU: 0 PID: 17520 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 268.339384] erofs: mounted on /dev/loop2 with opts: . [ 268.344643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.344648] Call Trace: [ 268.344674] dump_stack+0x1fc/0x2ef [ 268.344692] should_fail.cold+0xa/0xf [ 268.344712] ? setup_fault_attr+0x200/0x200 [ 268.344729] ? lock_acquire+0x170/0x3c0 [ 268.344751] ? dev_uevent_filter+0xd0/0xd0 [ 268.344763] __should_failslab+0x115/0x180 [ 268.344781] should_failslab+0x5/0x10 [ 268.344795] kmem_cache_alloc_trace+0x284/0x380 [ 268.344814] ? dev_uevent_filter+0xd0/0xd0 [ 268.344827] kobject_uevent_env+0x236/0x14a0 [ 268.344853] lo_ioctl+0xff9/0x20e0 [ 268.344872] ? loop_set_status64+0x110/0x110 [ 268.344890] blkdev_ioctl+0x5cb/0x1a80 [ 268.344903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.344917] ? blkpg_ioctl+0x9d0/0x9d0 [ 268.344935] ? mark_held_locks+0xf0/0xf0 [ 268.428201] ? mark_held_locks+0xf0/0xf0 [ 268.432271] ? debug_check_no_obj_freed+0x201/0x490 [ 268.437281] ? lock_downgrade+0x720/0x720 [ 268.441425] block_ioctl+0xe9/0x130 [ 268.445045] ? blkdev_fallocate+0x3f0/0x3f0 [ 268.449351] do_vfs_ioctl+0xcdb/0x12e0 [ 268.453314] ? lock_downgrade+0x720/0x720 [ 268.457449] ? check_preemption_disabled+0x41/0x280 [ 268.462461] ? ioctl_preallocate+0x200/0x200 [ 268.466940] ? __fget+0x356/0x510 [ 268.470400] ? do_dup2+0x450/0x450 [ 268.473935] ? do_sys_open+0x2bf/0x520 [ 268.477808] ksys_ioctl+0x9b/0xc0 [ 268.481257] __x64_sys_ioctl+0x6f/0xb0 [ 268.485141] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 268.489805] do_syscall_64+0xf9/0x620 [ 268.493616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.498844] RIP: 0033:0x4658c7 [ 268.502034] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.520943] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.528650] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 268.535905] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.543164] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 268.550433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 05:49:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 268.557692] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 268.572289] erofs: read_super, device -> /dev/loop1 [ 268.577918] erofs: options -> acl,noacl, [ 268.578765] erofs: unmounted for /dev/loop3 05:49:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:20 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 268.656280] erofs: unmounted for /dev/loop5 [ 268.662419] erofs: unmounted for /dev/loop1 [ 268.679401] erofs: read_super, device -> /dev/loop4 [ 268.686329] erofs: options -> [ 268.689800] erofs: blksize 1 isn't supported on this platform 05:49:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1904, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40b, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 268.726060] erofs: read_super, device -> /dev/loop0 [ 268.733172] erofs: options -> [ 268.736787] erofs: root inode @ nid 36 [ 268.749079] erofs: mounted on /dev/loop0 with opts: . [ 268.757780] erofs: unmounted for /dev/loop2 [ 268.843798] erofs: read_super, device -> /dev/loop5 [ 268.848844] erofs: options -> acl,noacl, [ 268.855468] erofs: root inode @ nid 36 [ 268.855479] FAULT_INJECTION: forcing a failure. [ 268.855479] name failslab, interval 1, probability 0, space 0, times 0 [ 268.855498] CPU: 1 PID: 17538 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 268.859653] erofs: mounted on /dev/loop5 with opts: acl. [ 268.870553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.870559] Call Trace: [ 268.870585] dump_stack+0x1fc/0x2ef [ 268.870606] should_fail.cold+0xa/0xf [ 268.870624] ? setup_fault_attr+0x200/0x200 [ 268.870638] ? lock_acquire+0x170/0x3c0 [ 268.870658] __should_failslab+0x115/0x180 [ 268.915708] should_failslab+0x5/0x10 [ 268.919493] __kmalloc+0x2ab/0x3c0 [ 268.923017] ? kobject_get_path+0xbf/0x240 [ 268.927236] kobject_get_path+0xbf/0x240 [ 268.931285] kobject_uevent_env+0x25c/0x14a0 [ 268.935680] lo_ioctl+0xff9/0x20e0 [ 268.939204] ? loop_set_status64+0x110/0x110 [ 268.943597] blkdev_ioctl+0x5cb/0x1a80 [ 268.947471] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.952828] ? blkpg_ioctl+0x9d0/0x9d0 [ 268.956728] ? mark_held_locks+0xf0/0xf0 [ 268.960788] ? mark_held_locks+0xf0/0xf0 [ 268.964844] ? debug_check_no_obj_freed+0x201/0x490 [ 268.969849] ? lock_downgrade+0x720/0x720 [ 268.973997] block_ioctl+0xe9/0x130 [ 268.977621] ? blkdev_fallocate+0x3f0/0x3f0 [ 268.981940] do_vfs_ioctl+0xcdb/0x12e0 [ 268.985854] ? lock_downgrade+0x720/0x720 [ 268.989995] ? check_preemption_disabled+0x41/0x280 [ 268.994994] ? ioctl_preallocate+0x200/0x200 [ 268.999388] ? __fget+0x356/0x510 [ 269.002824] ? do_dup2+0x450/0x450 [ 269.006346] ? do_sys_open+0x2bf/0x520 [ 269.010218] ksys_ioctl+0x9b/0xc0 [ 269.013678] __x64_sys_ioctl+0x6f/0xb0 [ 269.017598] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 269.022167] do_syscall_64+0xf9/0x620 [ 269.025965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.031146] RIP: 0033:0x4658c7 [ 269.034332] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.053223] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.061071] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 269.068392] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.075647] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 269.082911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 05:49:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 269.090175] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 269.099853] erofs: read_super, device -> /dev/loop3 [ 269.104956] erofs: options -> acl,noacl, [ 269.110327] erofs: read_super, device -> /dev/loop1 [ 269.115413] erofs: options -> acl,noacl, [ 269.117989] erofs: unmounted for /dev/loop0 05:49:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:21 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 269.206941] erofs: unmounted for /dev/loop5 [ 269.211539] erofs: unmounted for /dev/loop3 [ 269.216112] erofs: unmounted for /dev/loop1 [ 269.261011] erofs: read_super, device -> /dev/loop2 [ 269.266598] erofs: options -> [ 269.277172] erofs: root inode @ nid 36 [ 269.281529] erofs: mounted on /dev/loop2 with opts: . [ 269.300550] Bluetooth: hci0: command 0x0406 tx timeout [ 269.306745] Bluetooth: hci1: command 0x0406 tx timeout [ 269.318623] erofs: read_super, device -> /dev/loop4 [ 269.319145] erofs: read_super, device -> /dev/loop5 [ 269.323872] erofs: options -> [ 269.333974] erofs: options -> acl,noacl, [ 269.334011] erofs: blksize 1 isn't supported on this platform [ 269.338204] Bluetooth: hci2: command 0x0406 tx timeout [ 269.350127] erofs: root inode @ nid 36 [ 269.354417] Bluetooth: hci3: command 0x0406 tx timeout [ 269.362744] erofs: mounted on /dev/loop5 with opts: acl. [ 269.368371] Bluetooth: hci4: command 0x0406 tx timeout [ 269.374981] Bluetooth: hci5: command 0x0406 tx timeout [ 269.412806] FAULT_INJECTION: forcing a failure. [ 269.412806] name failslab, interval 1, probability 0, space 0, times 0 [ 269.424542] CPU: 0 PID: 17572 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 269.432435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.441913] Call Trace: [ 269.444536] dump_stack+0x1fc/0x2ef [ 269.448165] should_fail.cold+0xa/0xf [ 269.451951] ? setup_fault_attr+0x200/0x200 [ 269.456259] ? lock_acquire+0x170/0x3c0 [ 269.460220] __should_failslab+0x115/0x180 [ 269.464467] should_failslab+0x5/0x10 [ 269.468276] kmem_cache_alloc_node+0x245/0x3b0 [ 269.472860] __alloc_skb+0x71/0x560 [ 269.476474] alloc_uevent_skb+0x7b/0x210 [ 269.480533] kobject_uevent_env+0xa83/0x14a0 [ 269.484956] lo_ioctl+0xff9/0x20e0 [ 269.488492] ? loop_set_status64+0x110/0x110 [ 269.492898] blkdev_ioctl+0x5cb/0x1a80 [ 269.496779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.502141] ? blkpg_ioctl+0x9d0/0x9d0 [ 269.506025] ? mark_held_locks+0xf0/0xf0 [ 269.510070] ? mark_held_locks+0xf0/0xf0 [ 269.514121] ? debug_check_no_obj_freed+0x201/0x490 [ 269.519133] ? lock_downgrade+0x720/0x720 [ 269.523294] block_ioctl+0xe9/0x130 [ 269.526927] ? blkdev_fallocate+0x3f0/0x3f0 [ 269.531255] do_vfs_ioctl+0xcdb/0x12e0 [ 269.535154] ? lock_downgrade+0x720/0x720 [ 269.539302] ? check_preemption_disabled+0x41/0x280 [ 269.544317] ? ioctl_preallocate+0x200/0x200 [ 269.548721] ? __fget+0x356/0x510 [ 269.552158] ? do_dup2+0x450/0x450 [ 269.555682] ? do_sys_open+0x2bf/0x520 [ 269.559558] ksys_ioctl+0x9b/0xc0 [ 269.563008] __x64_sys_ioctl+0x6f/0xb0 [ 269.566891] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 269.571460] do_syscall_64+0xf9/0x620 [ 269.575250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.580424] RIP: 0033:0x4658c7 [ 269.583622] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.602528] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:49:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 269.610233] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 269.617548] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.624802] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 269.632058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 269.639309] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 269.649034] erofs: unmounted for /dev/loop5 05:49:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1a04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 269.664671] erofs: read_super, device -> /dev/loop3 [ 269.669720] erofs: options -> acl,noacl, [ 269.676048] erofs: read_super, device -> /dev/loop1 [ 269.679729] erofs: read_super, device -> /dev/loop0 [ 269.684335] erofs: options -> acl,noacl, [ 269.696045] erofs: options -> [ 269.704433] erofs: root inode @ nid 36 [ 269.709576] erofs: mounted on /dev/loop0 with opts: . 05:49:21 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 269.709853] erofs: unmounted for /dev/loop2 [ 269.748010] erofs: unmounted for /dev/loop1 [ 269.752773] erofs: read_super, device -> /dev/loop4 [ 269.757798] erofs: options -> 05:49:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 269.798534] erofs: blksize 1 isn't supported on this platform [ 269.815517] erofs: unmounted for /dev/loop0 [ 269.820000] erofs: unmounted for /dev/loop3 [ 269.843183] erofs: read_super, device -> /dev/loop2 05:49:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40c, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 269.848234] erofs: options -> [ 269.852298] erofs: root inode @ nid 36 [ 269.856613] erofs: mounted on /dev/loop2 with opts: . [ 269.921659] erofs: read_super, device -> /dev/loop5 [ 269.926822] erofs: options -> acl,noacl, [ 269.931425] erofs: root inode @ nid 36 [ 269.935413] erofs: mounted on /dev/loop5 with opts: acl. [ 269.953055] FAULT_INJECTION: forcing a failure. [ 269.953055] name failslab, interval 1, probability 0, space 0, times 0 [ 269.964469] CPU: 0 PID: 17596 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 269.972340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.981691] Call Trace: [ 269.984290] dump_stack+0x1fc/0x2ef [ 269.987916] should_fail.cold+0xa/0xf [ 269.991710] ? setup_fault_attr+0x200/0x200 [ 269.996019] ? lock_acquire+0x170/0x3c0 [ 269.999981] __should_failslab+0x115/0x180 [ 270.004224] should_failslab+0x5/0x10 [ 270.008029] kmem_cache_alloc_trace+0x284/0x380 [ 270.012691] ? wait_for_completion_io+0x10/0x10 [ 270.017353] ? kobj_ns_initial+0x90/0x90 [ 270.021415] call_usermodehelper_setup+0x84/0x300 [ 270.026268] kobject_uevent_env+0xe87/0x14a0 [ 270.030860] lo_ioctl+0xff9/0x20e0 [ 270.034401] ? loop_set_status64+0x110/0x110 [ 270.038795] blkdev_ioctl+0x5cb/0x1a80 [ 270.042683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.048153] ? blkpg_ioctl+0x9d0/0x9d0 [ 270.052027] ? mark_held_locks+0xf0/0xf0 [ 270.056074] ? mark_held_locks+0xf0/0xf0 [ 270.060120] ? debug_check_no_obj_freed+0x201/0x490 [ 270.065138] ? lock_downgrade+0x720/0x720 [ 270.069282] block_ioctl+0xe9/0x130 [ 270.072896] ? blkdev_fallocate+0x3f0/0x3f0 [ 270.077203] do_vfs_ioctl+0xcdb/0x12e0 [ 270.081087] ? lock_downgrade+0x720/0x720 [ 270.085229] ? check_preemption_disabled+0x41/0x280 [ 270.090233] ? ioctl_preallocate+0x200/0x200 [ 270.094706] ? __fget+0x356/0x510 [ 270.098147] ? do_dup2+0x450/0x450 [ 270.101682] ? do_sys_open+0x2bf/0x520 [ 270.105571] ksys_ioctl+0x9b/0xc0 [ 270.109011] __x64_sys_ioctl+0x6f/0xb0 [ 270.112896] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 270.117462] do_syscall_64+0xf9/0x620 [ 270.121264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.126449] RIP: 0033:0x4658c7 [ 270.129668] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.148576] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.156269] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 270.163531] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 270.170799] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 270.178054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 270.185316] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 270.274860] erofs: read_super, device -> /dev/loop1 05:49:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1b04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:22 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 270.305231] erofs: options -> acl,noacl, [ 270.309718] erofs: unmounted for /dev/loop2 [ 270.329377] erofs: read_super, device -> /dev/loop3 [ 270.343489] erofs: unmounted for /dev/loop5 [ 270.345436] erofs: options -> acl,noacl, [ 270.380287] erofs: unmounted for /dev/loop1 [ 270.410496] erofs: read_super, device -> /dev/loop4 [ 270.416345] erofs: options -> [ 270.421895] erofs: blksize 1 isn't supported on this platform [ 270.441153] erofs: read_super, device -> /dev/loop0 [ 270.448989] erofs: options -> [ 270.454099] erofs: root inode @ nid 36 05:49:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 270.458297] erofs: mounted on /dev/loop0 with opts: . [ 270.465739] erofs: unmounted for /dev/loop3 [ 270.473627] erofs: read_super, device -> /dev/loop5 [ 270.478662] erofs: options -> acl,noacl, [ 270.479609] erofs: read_super, device -> /dev/loop2 [ 270.502352] erofs: root inode @ nid 36 [ 270.503448] erofs: options -> [ 270.511021] erofs: mounted on /dev/loop5 with opts: acl. [ 270.519666] erofs: root inode @ nid 36 [ 270.528483] erofs: mounted on /dev/loop2 with opts: . [ 270.535691] FAULT_INJECTION: forcing a failure. [ 270.535691] name failslab, interval 1, probability 0, space 0, times 0 [ 270.547289] CPU: 1 PID: 17628 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 270.555179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.564548] Call Trace: [ 270.567131] dump_stack+0x1fc/0x2ef [ 270.570746] should_fail.cold+0xa/0xf [ 270.574550] ? setup_fault_attr+0x200/0x200 [ 270.578863] ? lock_acquire+0x170/0x3c0 [ 270.582826] __should_failslab+0x115/0x180 [ 270.587053] should_failslab+0x5/0x10 [ 270.590839] kmem_cache_alloc_trace+0x284/0x380 [ 270.595495] ? wait_for_completion_io+0x10/0x10 [ 270.600148] ? kobj_ns_initial+0x90/0x90 [ 270.604202] call_usermodehelper_setup+0x84/0x300 [ 270.609042] kobject_uevent_env+0xe87/0x14a0 [ 270.613458] lo_ioctl+0xff9/0x20e0 [ 270.616985] ? loop_set_status64+0x110/0x110 [ 270.621384] blkdev_ioctl+0x5cb/0x1a80 [ 270.625268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.630642] ? blkpg_ioctl+0x9d0/0x9d0 [ 270.634527] ? mark_held_locks+0xf0/0xf0 [ 270.638583] ? mark_held_locks+0xf0/0xf0 [ 270.642642] ? debug_check_no_obj_freed+0x201/0x490 [ 270.647681] ? lock_downgrade+0x720/0x720 [ 270.651827] block_ioctl+0xe9/0x130 [ 270.655453] ? blkdev_fallocate+0x3f0/0x3f0 [ 270.659772] do_vfs_ioctl+0xcdb/0x12e0 [ 270.663654] ? lock_downgrade+0x720/0x720 [ 270.667786] ? check_preemption_disabled+0x41/0x280 [ 270.672854] ? ioctl_preallocate+0x200/0x200 [ 270.677270] ? __fget+0x356/0x510 [ 270.680730] ? do_dup2+0x450/0x450 [ 270.684267] ? do_sys_open+0x2bf/0x520 [ 270.688142] ksys_ioctl+0x9b/0xc0 [ 270.691580] __x64_sys_ioctl+0x6f/0xb0 [ 270.695453] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 270.700027] do_syscall_64+0xf9/0x620 [ 270.703814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.708986] RIP: 0033:0x4658c7 [ 270.712160] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.731064] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.738774] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 270.746059] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 270.753335] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 270.760590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 270.767844] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 05:49:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 270.847495] erofs: read_super, device -> /dev/loop4 [ 270.853066] erofs: read_super, device -> /dev/loop1 [ 270.857716] erofs: options -> [ 270.865570] erofs: options -> acl,noacl, [ 270.880864] erofs: unmounted for /dev/loop5 [ 270.885025] erofs: blksize 1 isn't supported on this platform 05:49:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1c04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 270.896277] erofs: unmounted for /dev/loop0 [ 270.899860] erofs: read_super, device -> /dev/loop3 [ 270.910049] erofs: options -> acl,noacl, [ 270.915760] erofs: unmounted for /dev/loop2 05:49:23 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40d, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 271.028514] erofs: unmounted for /dev/loop1 [ 271.137760] erofs: read_super, device -> /dev/loop0 [ 271.142451] erofs: read_super, device -> /dev/loop2 [ 271.152248] erofs: options -> [ 271.155764] erofs: root inode @ nid 36 [ 271.156391] erofs: read_super, device -> /dev/loop5 [ 271.166522] erofs: mounted on /dev/loop2 with opts: . [ 271.170323] erofs: options -> [ 271.176940] erofs: root inode @ nid 36 [ 271.179513] erofs: read_super, device -> /dev/loop4 05:49:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 271.185961] erofs: options -> [ 271.189684] erofs: blksize 1 isn't supported on this platform [ 271.191924] erofs: options -> acl,noacl, [ 271.201929] erofs: mounted on /dev/loop0 with opts: . [ 271.207633] erofs: unmounted for /dev/loop3 [ 271.208669] erofs: root inode @ nid 36 [ 271.216816] erofs: mounted on /dev/loop5 with opts: acl. [ 271.286853] FAULT_INJECTION: forcing a failure. [ 271.286853] name failslab, interval 1, probability 0, space 0, times 0 [ 271.298950] CPU: 1 PID: 17667 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 271.306837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.316187] Call Trace: [ 271.318767] dump_stack+0x1fc/0x2ef [ 271.322382] should_fail.cold+0xa/0xf [ 271.326224] ? setup_fault_attr+0x200/0x200 [ 271.330578] ? lock_acquire+0x170/0x3c0 05:49:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1d04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 271.334550] __should_failslab+0x115/0x180 [ 271.338789] should_failslab+0x5/0x10 [ 271.342595] kmem_cache_alloc_trace+0x284/0x380 [ 271.347279] ? wait_for_completion_io+0x10/0x10 [ 271.351956] ? kobj_ns_initial+0x90/0x90 [ 271.356086] call_usermodehelper_setup+0x84/0x300 [ 271.360919] kobject_uevent_env+0xe87/0x14a0 [ 271.365327] lo_ioctl+0xff9/0x20e0 [ 271.368859] ? loop_set_status64+0x110/0x110 [ 271.373277] blkdev_ioctl+0x5cb/0x1a80 [ 271.377160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.382557] ? blkpg_ioctl+0x9d0/0x9d0 05:49:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 271.386452] ? mark_held_locks+0xf0/0xf0 [ 271.390517] ? mark_held_locks+0xf0/0xf0 [ 271.394592] ? debug_check_no_obj_freed+0x201/0x490 [ 271.399633] ? lock_downgrade+0x720/0x720 [ 271.403788] block_ioctl+0xe9/0x130 [ 271.407411] ? blkdev_fallocate+0x3f0/0x3f0 [ 271.411721] do_vfs_ioctl+0xcdb/0x12e0 [ 271.415607] ? lock_downgrade+0x720/0x720 [ 271.419752] ? check_preemption_disabled+0x41/0x280 [ 271.424753] ? ioctl_preallocate+0x200/0x200 [ 271.429146] ? __fget+0x356/0x510 [ 271.432628] ? do_dup2+0x450/0x450 [ 271.436171] ? do_sys_open+0x2bf/0x520 [ 271.440050] ksys_ioctl+0x9b/0xc0 [ 271.443502] __x64_sys_ioctl+0x6f/0xb0 [ 271.447384] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 271.452029] do_syscall_64+0xf9/0x620 [ 271.455819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.461002] RIP: 0033:0x4658c7 [ 271.464178] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 4d 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.483068] RSP: 002b:00007f027c8ebf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.490759] RAX: ffffffffffffffda RBX: 00000000004bf878 RCX: 00000000004658c7 [ 271.498061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 271.505358] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 271.512630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 271.519882] R13: 0000000000000004 R14: 0000000020000088 R15: 0000000000000003 [ 271.527325] erofs: unmounted for /dev/loop2 [ 271.532904] erofs: read_super, device -> /dev/loop4 05:49:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 271.537935] erofs: options -> [ 271.544120] erofs: read_super, device -> /dev/loop1 [ 271.549224] erofs: blksize 1 isn't supported on this platform [ 271.555210] erofs: options -> acl,noacl, [ 271.562444] erofs: unmounted for /dev/loop5 05:49:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40e, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 271.586055] erofs: unmounted for /dev/loop0 [ 271.763356] erofs: read_super, device -> /dev/loop3 [ 271.768632] erofs: options -> acl,noacl, [ 271.772926] erofs: cannot read erofs superblock 05:49:24 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 271.828242] erofs: unmounted for /dev/loop1 [ 271.848823] erofs: read_super, device -> /dev/loop2 [ 271.855863] erofs: options -> [ 271.861528] erofs: root inode @ nid 36 [ 271.875606] erofs: mounted on /dev/loop2 with opts: . [ 271.904764] erofs: read_super, device -> /dev/loop4 [ 271.905504] erofs: read_super, device -> /dev/loop5 [ 271.910083] erofs: read_super, device -> /dev/loop3 [ 271.916002] erofs: read_super, device -> /dev/loop0 [ 271.924834] erofs: options -> acl,noacl, [ 271.929311] erofs: options -> [ 271.941638] erofs: cannot read erofs superblock 05:49:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1e04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 271.953603] erofs: blksize 1 isn't supported on this platform [ 271.962546] erofs: options -> acl,noacl, [ 271.966932] erofs: root inode @ nid 36 [ 271.971192] erofs: mounted on /dev/loop5 with opts: acl. [ 271.978905] erofs: options -> [ 271.984152] erofs: root inode @ nid 36 05:49:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 272.002939] erofs: mounted on /dev/loop0 with opts: . [ 272.006637] erofs: unmounted for /dev/loop2 [ 272.016882] erofs: unmounted for /dev/loop5 05:49:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 272.113740] FAULT_INJECTION: forcing a failure. [ 272.113740] name failslab, interval 1, probability 0, space 0, times 0 [ 272.125511] CPU: 1 PID: 17708 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 272.133397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.142750] Call Trace: [ 272.145332] dump_stack+0x1fc/0x2ef [ 272.148946] should_fail.cold+0xa/0xf [ 272.152734] ? setup_fault_attr+0x200/0x200 [ 272.157056] ? lock_acquire+0x170/0x3c0 [ 272.161035] __should_failslab+0x115/0x180 [ 272.165259] should_failslab+0x5/0x10 [ 272.169043] kmem_cache_alloc+0x277/0x370 [ 272.173239] __d_alloc+0x2b/0xa10 [ 272.176691] d_alloc+0x4a/0x230 [ 272.179967] __lookup_hash+0xc8/0x180 [ 272.183756] filename_create+0x186/0x490 [ 272.187809] ? kern_path_mountpoint+0x40/0x40 [ 272.192312] ? strncpy_from_user+0x2a2/0x350 [ 272.196727] ? getname_flags+0x25b/0x590 [ 272.200782] do_mkdirat+0xa0/0x2d0 [ 272.204350] ? __ia32_sys_mknod+0x120/0x120 [ 272.208655] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.213656] ? do_syscall_64+0x21/0x620 [ 272.217614] do_syscall_64+0xf9/0x620 [ 272.221398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.226570] RIP: 0033:0x464c17 [ 272.229745] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.248679] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 272.256389] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 05:49:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40f, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 272.263646] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 272.270900] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 272.278154] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 272.285406] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 272.403042] erofs: unmounted for /dev/loop0 05:49:24 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 272.484101] erofs: read_super, device -> /dev/loop2 [ 272.489285] erofs: options -> [ 272.508591] erofs: root inode @ nid 36 [ 272.514891] erofs: read_super, device -> /dev/loop3 [ 272.522689] erofs: mounted on /dev/loop2 with opts: . [ 272.524886] erofs: options -> acl,noacl, [ 272.538341] erofs: read_super, device -> /dev/loop5 [ 272.545692] erofs: read_super, device -> /dev/loop4 [ 272.546671] erofs: options -> acl,noacl, [ 272.550727] erofs: options -> [ 272.551458] erofs: blksize 1 isn't supported on this platform [ 272.578690] erofs: read_super, device -> /dev/loop0 05:49:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1f04, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 272.615352] erofs: root inode @ nid 36 [ 272.623468] erofs: options -> [ 272.631689] erofs: root inode @ nid 36 [ 272.632011] erofs: unmounted for /dev/loop2 [ 272.636624] erofs: mounted on /dev/loop5 with opts: acl. [ 272.659520] erofs: mounted on /dev/loop0 with opts: . 05:49:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 272.668422] FAULT_INJECTION: forcing a failure. [ 272.668422] name failslab, interval 1, probability 0, space 0, times 0 [ 272.682366] erofs: unmounted for /dev/loop3 [ 272.684132] CPU: 1 PID: 17742 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 272.694581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.703923] Call Trace: [ 272.706509] dump_stack+0x1fc/0x2ef [ 272.710143] should_fail.cold+0xa/0xf [ 272.713934] ? setup_fault_attr+0x200/0x200 [ 272.718244] ? lock_acquire+0x170/0x3c0 [ 272.722208] __should_failslab+0x115/0x180 [ 272.726431] should_failslab+0x5/0x10 [ 272.730217] kmem_cache_alloc+0x277/0x370 [ 272.734355] __d_alloc+0x2b/0xa10 [ 272.737798] d_alloc+0x4a/0x230 [ 272.741070] __lookup_hash+0xc8/0x180 [ 272.744856] filename_create+0x186/0x490 [ 272.748902] ? kern_path_mountpoint+0x40/0x40 [ 272.753386] ? strncpy_from_user+0x2a2/0x350 [ 272.757785] ? getname_flags+0x25b/0x590 [ 272.761832] do_mkdirat+0xa0/0x2d0 [ 272.765361] ? __ia32_sys_mknod+0x120/0x120 [ 272.769671] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.774677] ? do_syscall_64+0x21/0x620 [ 272.778641] do_syscall_64+0xf9/0x620 [ 272.782431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.787606] RIP: 0033:0x464c17 [ 272.790787] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.809674] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 05:49:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 272.817371] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 272.824625] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 272.831891] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 272.839149] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 272.846409] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 272.878448] erofs: unmounted for /dev/loop0 [ 272.905286] erofs: unmounted for /dev/loop5 05:49:25 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.017134] erofs: read_super, device -> /dev/loop2 [ 273.017138] erofs: read_super, device -> /dev/loop4 [ 273.017146] erofs: options -> [ 273.022173] erofs: options -> [ 273.048782] erofs: read_super, device -> /dev/loop0 [ 273.054879] erofs: options -> [ 273.058152] erofs: root inode @ nid 36 [ 273.062334] erofs: mounted on /dev/loop2 with opts: . 05:49:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 273.081903] erofs: blksize 1 isn't supported on this platform [ 273.091539] erofs: root inode @ nid 36 [ 273.101745] erofs: mounted on /dev/loop0 with opts: . 05:49:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 273.210242] FAULT_INJECTION: forcing a failure. [ 273.210242] name failslab, interval 1, probability 0, space 0, times 0 [ 273.224942] erofs: read_super, device -> /dev/loop3 [ 273.229984] erofs: options -> acl,noacl, [ 273.244949] erofs: read_super, device -> /dev/loop5 [ 273.250026] erofs: options -> acl,noacl, [ 273.250310] erofs: unmounted for /dev/loop2 05:49:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.266151] erofs: root inode @ nid 36 [ 273.280876] erofs: mounted on /dev/loop5 with opts: acl. [ 273.306956] CPU: 1 PID: 17768 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 273.314884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.324249] Call Trace: [ 273.326857] dump_stack+0x1fc/0x2ef [ 273.330498] should_fail.cold+0xa/0xf [ 273.334315] ? setup_fault_attr+0x200/0x200 [ 273.338646] ? lock_acquire+0x170/0x3c0 [ 273.342637] __should_failslab+0x115/0x180 [ 273.346885] should_failslab+0x5/0x10 [ 273.350695] kmem_cache_alloc+0x277/0x370 [ 273.354855] __d_alloc+0x2b/0xa10 [ 273.358322] d_alloc+0x4a/0x230 [ 273.361626] __lookup_hash+0xc8/0x180 [ 273.365439] filename_create+0x186/0x490 [ 273.369509] ? kern_path_mountpoint+0x40/0x40 [ 273.374015] ? strncpy_from_user+0x2a2/0x350 [ 273.378437] ? getname_flags+0x25b/0x590 [ 273.382514] do_mkdirat+0xa0/0x2d0 [ 273.386067] ? __ia32_sys_mknod+0x120/0x120 [ 273.390401] ? trace_hardirqs_off_caller+0x6e/0x210 [ 273.395426] ? do_syscall_64+0x21/0x620 [ 273.399412] do_syscall_64+0xf9/0x620 [ 273.403230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.408425] RIP: 0033:0x464c17 [ 273.411627] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.430537] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 273.438260] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 273.445542] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 05:49:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.452824] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 273.460104] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 273.467382] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 273.504499] erofs: unmounted for /dev/loop3 [ 273.515985] erofs: unmounted for /dev/loop5 [ 273.524770] erofs: unmounted for /dev/loop0 [ 273.555353] erofs: read_super, device -> /dev/loop4 [ 273.563953] erofs: options -> [ 273.571528] erofs: blksize 1 isn't supported on this platform 05:49:25 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.775917] erofs: read_super, device -> /dev/loop3 [ 273.780976] erofs: options -> ac [ 273.790851] erofs: Unrecognized mount option "ac" or missing value [ 273.814540] erofs: read_super, device -> /dev/loop4 [ 273.818420] erofs: read_super, device -> /dev/loop2 [ 273.824845] erofs: options -> [ 273.826011] erofs: options -> [ 273.828605] FAULT_INJECTION: forcing a failure. [ 273.828605] name failslab, interval 1, probability 0, space 0, times 0 [ 273.831901] erofs: read_super, device -> /dev/loop5 [ 273.847424] erofs: blksize 1 isn't supported on this platform [ 273.854110] erofs: read_super, device -> /dev/loop0 05:49:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.892753] erofs: root inode @ nid 36 [ 273.894966] erofs: options -> [ 273.897998] erofs: mounted on /dev/loop2 with opts: . [ 273.942341] erofs: root inode @ nid 36 [ 273.958919] CPU: 1 PID: 17808 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 273.960067] erofs: options -> acl,noacl, [ 273.966837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.966843] Call Trace: [ 273.966871] dump_stack+0x1fc/0x2ef [ 273.966891] should_fail.cold+0xa/0xf 05:49:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 273.966907] ? setup_fault_attr+0x200/0x200 [ 273.966923] ? lock_acquire+0x170/0x3c0 [ 273.966943] __should_failslab+0x115/0x180 [ 273.966958] should_failslab+0x5/0x10 [ 273.966973] kmem_cache_alloc+0x277/0x370 [ 273.966990] __d_alloc+0x2b/0xa10 [ 273.967010] d_alloc+0x4a/0x230 [ 273.967029] __lookup_hash+0xc8/0x180 [ 273.967044] filename_create+0x186/0x490 [ 273.967063] ? kern_path_mountpoint+0x40/0x40 [ 273.982099] erofs: root inode @ nid 36 [ 273.983049] ? strncpy_from_user+0x2a2/0x350 [ 273.983073] ? getname_flags+0x25b/0x590 [ 273.983087] do_mkdirat+0xa0/0x2d0 [ 273.983103] ? __ia32_sys_mknod+0x120/0x120 [ 273.988751] erofs: mounted on /dev/loop5 with opts: acl. [ 273.990513] ? trace_hardirqs_off_caller+0x6e/0x210 [ 273.990530] ? do_syscall_64+0x21/0x620 [ 273.990547] do_syscall_64+0xf9/0x620 [ 273.990565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.010448] erofs: mounted on /dev/loop0 with opts: . [ 274.010963] RIP: 0033:0x464c17 [ 274.010980] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.100749] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 274.108446] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 274.115704] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 274.122956] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 274.130211] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 05:49:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x26c2, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 274.137470] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 274.147494] erofs: unmounted for /dev/loop5 [ 274.156851] erofs: unmounted for /dev/loop2 05:49:26 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x411, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:26 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 274.188431] erofs: read_super, device -> /dev/loop3 [ 274.194680] erofs: options -> ac [ 274.203670] erofs: Unrecognized mount option "ac" or missing value [ 274.241564] erofs: unmounted for /dev/loop0 [ 274.438076] erofs: read_super, device -> /dev/loop4 [ 274.443358] erofs: options -> [ 274.444099] erofs: read_super, device -> /dev/loop2 [ 274.449064] erofs: blksize 1 isn't supported on this platform [ 274.452621] erofs: options -> [ 274.462229] erofs: read_super, device -> /dev/loop3 [ 274.476883] erofs: options -> ac [ 274.480803] erofs: root inode @ nid 36 [ 274.490169] erofs: Unrecognized mount option "ac" or missing value [ 274.492871] erofs: mounted on /dev/loop2 with opts: . 05:49:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x37, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 274.531702] FAULT_INJECTION: forcing a failure. [ 274.531702] name failslab, interval 1, probability 0, space 0, times 0 [ 274.547698] erofs: read_super, device -> /dev/loop0 [ 274.561796] erofs: read_super, device -> /dev/loop5 [ 274.562290] erofs: options -> [ 274.567390] erofs: read_super, device -> /dev/loop4 [ 274.578960] erofs: root inode @ nid 36 [ 274.588279] erofs: mounted on /dev/loop0 with opts: . [ 274.600055] erofs: options -> acl,noacl, [ 274.612259] erofs: options -> 05:49:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x26ce, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 274.634145] erofs: root inode @ nid 36 [ 274.640279] erofs: blksize 1 isn't supported on this platform [ 274.649114] erofs: mounted on /dev/loop5 with opts: acl. [ 274.656815] erofs: unmounted for /dev/loop2 [ 274.673117] CPU: 1 PID: 17844 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 05:49:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x223, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 274.681029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.690382] Call Trace: [ 274.692974] dump_stack+0x1fc/0x2ef [ 274.696619] should_fail.cold+0xa/0xf [ 274.700426] ? setup_fault_attr+0x200/0x200 [ 274.704733] ? __lock_acquire+0x6de/0x3ff0 [ 274.708957] __should_failslab+0x115/0x180 [ 274.713177] should_failslab+0x5/0x10 [ 274.716961] __kmalloc+0x2ab/0x3c0 [ 274.720500] ? ext4_find_extent+0x9bb/0xc70 [ 274.724823] ext4_find_extent+0x9bb/0xc70 [ 274.728960] ext4_ext_map_blocks+0x1c0/0x7390 [ 274.733439] ? __lock_acquire+0x6de/0x3ff0 [ 274.737829] ? __lock_acquire+0x6de/0x3ff0 [ 274.742055] ? mark_held_locks+0xf0/0xf0 [ 274.746114] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 274.751476] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 274.756655] ? mark_held_locks+0xf0/0xf0 [ 274.760706] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 274.765581] ? ext4_es_lookup_extent+0x375/0xb60 [ 274.770325] ? lock_downgrade+0x720/0x720 [ 274.774516] ? lock_acquire+0x170/0x3c0 [ 274.778483] ? check_preemption_disabled+0x41/0x280 [ 274.783542] ? lock_acquire+0x170/0x3c0 [ 274.787501] ? ext4_map_blocks+0x33e/0x1a50 [ 274.791810] ext4_map_blocks+0xd88/0x1a50 [ 274.795944] ? check_preemption_disabled+0x41/0x280 [ 274.801005] ? ext4_issue_zeroout+0x160/0x160 [ 274.805495] ? __brelse+0x84/0xa0 [ 274.808931] ? __ext4_new_inode+0x2eb/0x5a20 [ 274.813325] ext4_getblk+0xad/0x4f0 [ 274.816935] ? ext4_iomap_begin+0xe00/0xe00 [ 274.821251] ? ext4_free_inode+0x1780/0x1780 [ 274.825660] ? debug_check_no_obj_freed+0x201/0x490 [ 274.830662] ? __dquot_initialize+0x298/0xb70 [ 274.835143] ext4_bread+0x7c/0x210 [ 274.838669] ? ext4_getblk+0x4f0/0x4f0 [ 274.842590] ? dquot_initialize_needed+0x290/0x290 [ 274.847551] ? trace_hardirqs_off+0x64/0x200 [ 274.851945] ext4_append+0x155/0x370 [ 274.855642] ext4_mkdir+0x5bd/0xe10 [ 274.859256] ? ext4_init_dot_dotdot+0x600/0x600 [ 274.863910] ? generic_permission+0x116/0x4d0 [ 274.868433] ? inode_permission.part.0+0x10c/0x450 [ 274.873348] vfs_mkdir+0x508/0x7a0 [ 274.876921] do_mkdirat+0x262/0x2d0 [ 274.880532] ? __ia32_sys_mknod+0x120/0x120 [ 274.884835] ? trace_hardirqs_off_caller+0x6e/0x210 [ 274.889836] ? do_syscall_64+0x21/0x620 [ 274.893805] do_syscall_64+0xf9/0x620 [ 274.897602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.902777] RIP: 0033:0x464c17 [ 274.905956] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.924844] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 274.932537] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 274.939791] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 274.947043] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 274.954291] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 274.961566] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 274.969041] erofs: unmounted for /dev/loop0 05:49:27 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x412, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:27 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 275.062885] erofs: unmounted for /dev/loop5 [ 275.068006] erofs: read_super, device -> /dev/loop1 [ 275.078518] erofs: options -> acl,noacl, [ 275.121895] erofs: unmounted for /dev/loop1 [ 275.200087] erofs: read_super, device -> /dev/loop3 [ 275.211816] erofs: options -> ac [ 275.219874] erofs: Unrecognized mount option "ac" or missing value [ 275.262973] erofs: read_super, device -> /dev/loop2 [ 275.276915] erofs: options -> [ 275.292404] erofs: read_super, device -> /dev/loop5 [ 275.302547] erofs: options -> acl,noacl, [ 275.304701] erofs: root inode @ nid 36 [ 275.312937] erofs: root inode @ nid 36 [ 275.315858] erofs: mounted on /dev/loop2 with opts: . [ 275.319445] erofs: mounted on /dev/loop5 with opts: acl. 05:49:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f516f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 275.362100] erofs: read_super, device -> /dev/loop4 [ 275.363424] FAULT_INJECTION: forcing a failure. [ 275.363424] name failslab, interval 1, probability 0, space 0, times 0 [ 275.367358] erofs: options -> [ 275.380881] erofs: read_super, device -> /dev/loop0 [ 275.396386] erofs: options -> [ 275.407447] erofs: root inode @ nid 36 05:49:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 275.421557] erofs: mounted on /dev/loop0 with opts: . [ 275.432644] erofs: unmounted for /dev/loop5 [ 275.432879] CPU: 1 PID: 17883 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 275.444878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.452980] erofs: blksize 1 isn't supported on this platform [ 275.454232] Call Trace: [ 275.454262] dump_stack+0x1fc/0x2ef [ 275.454281] should_fail.cold+0xa/0xf [ 275.454298] ? setup_fault_attr+0x200/0x200 [ 275.454313] ? lock_downgrade+0x720/0x720 [ 275.454330] __should_failslab+0x115/0x180 [ 275.482857] should_failslab+0x5/0x10 [ 275.486672] __kmalloc+0x2ab/0x3c0 [ 275.490224] ? ext4_find_extent+0x9bb/0xc70 [ 275.494569] ext4_find_extent+0x9bb/0xc70 [ 275.498736] ext4_ext_map_blocks+0x1c0/0x7390 [ 275.503250] ? __lock_acquire+0x6de/0x3ff0 [ 275.507494] ? mark_held_locks+0xf0/0xf0 [ 275.511544] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 275.516941] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 275.522131] ? mark_held_locks+0xf0/0xf0 [ 275.526186] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 275.531022] ? ext4_es_lookup_extent+0x375/0xb60 [ 275.535762] ? ext4_map_blocks+0x59f/0x1a50 [ 275.540084] ? lock_acquire+0x170/0x3c0 [ 275.544048] ? ext4_map_blocks+0x740/0x1a50 [ 275.548361] ext4_map_blocks+0x7a2/0x1a50 [ 275.552496] ? check_preemption_disabled+0x41/0x280 [ 275.557498] ? ext4_issue_zeroout+0x160/0x160 [ 275.561986] ? __brelse+0x84/0xa0 [ 275.565432] ? __ext4_new_inode+0x2eb/0x5a20 [ 275.569861] ext4_getblk+0xad/0x4f0 [ 275.573488] ? ext4_iomap_begin+0xe00/0xe00 [ 275.577800] ? ext4_free_inode+0x1780/0x1780 [ 275.582210] ? debug_check_no_obj_freed+0x201/0x490 [ 275.587219] ? __dquot_initialize+0x298/0xb70 [ 275.591714] ext4_bread+0x7c/0x210 [ 275.595252] ? ext4_getblk+0x4f0/0x4f0 [ 275.599132] ? dquot_initialize_needed+0x290/0x290 [ 275.604045] ? trace_hardirqs_off+0x64/0x200 [ 275.608440] ext4_append+0x155/0x370 [ 275.612140] ext4_mkdir+0x5bd/0xe10 [ 275.615757] ? ext4_init_dot_dotdot+0x600/0x600 [ 275.620412] ? generic_permission+0x116/0x4d0 [ 275.624891] ? inode_permission.part.0+0x10c/0x450 [ 275.629804] vfs_mkdir+0x508/0x7a0 [ 275.633327] do_mkdirat+0x262/0x2d0 [ 275.636937] ? __ia32_sys_mknod+0x120/0x120 [ 275.641261] ? trace_hardirqs_off_caller+0x6e/0x210 [ 275.646272] ? do_syscall_64+0x21/0x620 [ 275.650229] do_syscall_64+0xf9/0x620 [ 275.654017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.659194] RIP: 0033:0x464c17 [ 275.662385] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.681285] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 275.688991] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 275.696249] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 275.703513] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 275.710773] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 275.718028] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 275.728284] erofs: unmounted for /dev/loop2 05:49:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:27 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 275.794488] erofs: unmounted for /dev/loop0 05:49:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 275.835659] erofs: read_super, device -> /dev/loop3 [ 275.840983] erofs: read_super, device -> /dev/loop4 [ 275.855232] erofs: options -> acl,noacl, [ 275.859433] erofs: options -> [ 275.862837] erofs: blksize 1 isn't supported on this platform [ 275.871702] erofs: cannot find valid erofs superblock 05:49:28 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x413, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 275.942942] erofs: read_super, device -> /dev/loop2 [ 275.949944] erofs: options -> [ 275.953535] erofs: root inode @ nid 36 [ 275.964836] erofs: mounted on /dev/loop2 with opts: . [ 275.987542] FAULT_INJECTION: forcing a failure. [ 275.987542] name failslab, interval 1, probability 0, space 0, times 0 [ 276.002884] CPU: 1 PID: 17908 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 276.010803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.020165] Call Trace: [ 276.022745] dump_stack+0x1fc/0x2ef [ 276.026405] should_fail.cold+0xa/0xf [ 276.030197] ? setup_fault_attr+0x200/0x200 [ 276.034509] ? lock_downgrade+0x720/0x720 [ 276.038645] __should_failslab+0x115/0x180 [ 276.042938] should_failslab+0x5/0x10 [ 276.046733] __kmalloc+0x2ab/0x3c0 [ 276.050269] ? ext4_find_extent+0x9bb/0xc70 [ 276.054591] ext4_find_extent+0x9bb/0xc70 [ 276.058728] ext4_ext_map_blocks+0x1c0/0x7390 [ 276.063276] ? __lock_acquire+0x6de/0x3ff0 [ 276.067511] ? mark_held_locks+0xf0/0xf0 [ 276.071613] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 276.076961] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 276.082140] ? mark_held_locks+0xf0/0xf0 [ 276.086226] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 276.091067] ? ext4_es_lookup_extent+0x375/0xb60 [ 276.095807] ? ext4_map_blocks+0x59f/0x1a50 [ 276.100127] ? lock_acquire+0x170/0x3c0 [ 276.104104] ? ext4_map_blocks+0x740/0x1a50 [ 276.108428] ext4_map_blocks+0x7a2/0x1a50 [ 276.112578] ? check_preemption_disabled+0x41/0x280 [ 276.117584] ? ext4_issue_zeroout+0x160/0x160 [ 276.122065] ? __brelse+0x84/0xa0 [ 276.125549] ? __ext4_new_inode+0x2eb/0x5a20 [ 276.129966] ext4_getblk+0xad/0x4f0 [ 276.133587] ? ext4_iomap_begin+0xe00/0xe00 [ 276.138013] ? ext4_free_inode+0x1780/0x1780 [ 276.142415] ? debug_check_no_obj_freed+0x201/0x490 [ 276.147434] ? __dquot_initialize+0x298/0xb70 [ 276.151941] ext4_bread+0x7c/0x210 [ 276.155476] ? ext4_getblk+0x4f0/0x4f0 [ 276.159350] ? dquot_initialize_needed+0x290/0x290 [ 276.164281] ? trace_hardirqs_off+0x64/0x200 [ 276.168697] ext4_append+0x155/0x370 [ 276.172409] ext4_mkdir+0x5bd/0xe10 [ 276.176025] ? ext4_init_dot_dotdot+0x600/0x600 [ 276.180679] ? generic_permission+0x116/0x4d0 [ 276.185160] ? inode_permission.part.0+0x10c/0x450 [ 276.190078] vfs_mkdir+0x508/0x7a0 [ 276.193603] do_mkdirat+0x262/0x2d0 [ 276.197213] ? __ia32_sys_mknod+0x120/0x120 [ 276.201520] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.206529] ? do_syscall_64+0x21/0x620 [ 276.210492] do_syscall_64+0xf9/0x620 [ 276.214284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.219459] RIP: 0033:0x464c17 [ 276.222643] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.241571] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 276.249266] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 276.256517] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 276.263771] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 276.271029] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 276.278284] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 276.329888] erofs: read_super, device -> /dev/loop5 [ 276.337728] erofs: options -> acl,noacl, [ 276.342366] erofs: root inode @ nid 36 [ 276.346889] erofs: mounted on /dev/loop5 with opts: acl. 05:49:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f517f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:28 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 276.481865] erofs: unmounted for /dev/loop2 [ 276.497880] erofs: read_super, device -> /dev/loop0 [ 276.510506] erofs: unmounted for /dev/loop5 [ 276.515014] erofs: options -> [ 276.519983] erofs: root inode @ nid 36 [ 276.527309] erofs: read_super, device -> /dev/loop4 [ 276.534267] erofs: mounted on /dev/loop0 with opts: . [ 276.535086] erofs: options -> [ 276.540898] FAULT_INJECTION: forcing a failure. [ 276.540898] name failslab, interval 1, probability 0, space 0, times 0 [ 276.554027] CPU: 1 PID: 17941 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 276.561915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.571262] Call Trace: [ 276.573847] dump_stack+0x1fc/0x2ef [ 276.577463] should_fail.cold+0xa/0xf [ 276.581250] ? setup_fault_attr+0x200/0x200 [ 276.585559] ? __es_tree_search.isra.0+0x1af/0x210 [ 276.590480] __should_failslab+0x115/0x180 [ 276.594705] should_failslab+0x5/0x10 [ 276.598491] kmem_cache_alloc+0x3f/0x370 [ 276.602544] __es_insert_extent+0x39b/0x13b0 [ 276.606948] ext4_es_insert_extent+0x22e/0x5e0 [ 276.611516] ? ext4_map_blocks+0x59f/0x1a50 [ 276.615824] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 276.621618] ext4_map_blocks+0xa2a/0x1a50 [ 276.625758] ? ext4_issue_zeroout+0x160/0x160 [ 276.630242] ? __brelse+0x84/0xa0 [ 276.633681] ? __ext4_new_inode+0x2eb/0x5a20 [ 276.638082] ext4_getblk+0xad/0x4f0 [ 276.641697] ? ext4_iomap_begin+0xe00/0xe00 [ 276.646008] ? ext4_free_inode+0x1780/0x1780 [ 276.650403] ? debug_check_no_obj_freed+0x201/0x490 [ 276.655404] ? __dquot_initialize+0x298/0xb70 [ 276.659888] ext4_bread+0x7c/0x210 [ 276.663414] ? ext4_getblk+0x4f0/0x4f0 [ 276.667289] ? dquot_initialize_needed+0x290/0x290 [ 276.672233] ? trace_hardirqs_off+0x64/0x200 [ 276.676630] ext4_append+0x155/0x370 [ 276.680333] ext4_mkdir+0x5bd/0xe10 [ 276.683950] ? ext4_init_dot_dotdot+0x600/0x600 [ 276.688606] ? generic_permission+0x116/0x4d0 [ 276.693091] ? inode_permission.part.0+0x10c/0x450 [ 276.698011] vfs_mkdir+0x508/0x7a0 [ 276.701539] do_mkdirat+0x262/0x2d0 [ 276.705152] ? __ia32_sys_mknod+0x120/0x120 [ 276.709459] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.714469] ? do_syscall_64+0x21/0x620 [ 276.718431] do_syscall_64+0xf9/0x620 [ 276.722222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.727395] RIP: 0033:0x464c17 [ 276.730573] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.749457] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 276.757153] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000464c17 [ 276.764407] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 276.771678] RBP: 00007f027c8ec040 R08: 0000000000000000 R09: ffffffffffffffff [ 276.778934] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 276.786188] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 276.800168] erofs: read_super, device -> /dev/loop1 [ 276.805542] erofs: options -> acl,noacl, [ 276.808772] erofs: read_super, device -> /dev/loop3 [ 276.847108] erofs: blksize 1 isn't supported on this platform [ 276.858917] erofs: options -> acl,noacl, 05:49:29 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 276.903709] erofs: read_super, device -> /dev/loop2 [ 276.918078] erofs: cannot find valid erofs superblock [ 276.930371] erofs: options -> [ 276.933783] erofs: unmounted for /dev/loop1 [ 276.943164] erofs: unmounted for /dev/loop0 [ 276.943278] erofs: root inode @ nid 36 [ 276.953842] erofs: mounted on /dev/loop2 with opts: . 05:49:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc226, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 277.099719] erofs: unmounted for /dev/loop2 [ 277.108169] FAULT_INJECTION: forcing a failure. [ 277.108169] name failslab, interval 1, probability 0, space 0, times 0 [ 277.120085] CPU: 0 PID: 17957 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 277.127979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.137334] Call Trace: [ 277.139931] dump_stack+0x1fc/0x2ef [ 277.143573] should_fail.cold+0xa/0xf [ 277.147381] ? setup_fault_attr+0x200/0x200 [ 277.147654] erofs: read_super, device -> /dev/loop0 [ 277.151707] ? lock_acquire+0x170/0x3c0 [ 277.160679] __should_failslab+0x115/0x180 [ 277.161325] erofs: read_super, device -> /dev/loop5 [ 277.164915] should_failslab+0x5/0x10 [ 277.164933] __kmalloc_track_caller+0x2a6/0x3c0 [ 277.164947] ? strndup_user+0x70/0x120 [ 277.164965] memdup_user+0x22/0xb0 [ 277.185832] strndup_user+0x70/0x120 [ 277.189565] ksys_mount+0x34/0x130 [ 277.193123] __x64_sys_mount+0xba/0x150 [ 277.197116] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 277.201713] do_syscall_64+0xf9/0x620 [ 277.205528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.210723] RIP: 0033:0x46702a [ 277.213923] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.232833] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 277.240554] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a 05:49:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x414, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f30ac56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 277.247837] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 277.248958] erofs: options -> [ 277.255111] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 277.255120] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 277.255129] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 277.285731] erofs: options -> acl,noacl, [ 277.297639] erofs: root inode @ nid 36 [ 277.301977] erofs: root inode @ nid 36 [ 277.304114] erofs: mounted on /dev/loop5 with opts: acl. [ 277.306315] erofs: mounted on /dev/loop0 with opts: . 05:49:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 277.374870] erofs: read_super, device -> /dev/loop4 05:49:29 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 277.398664] erofs: unmounted for /dev/loop0 [ 277.403631] erofs: options -> [ 277.417105] erofs: blksize 1 isn't supported on this platform [ 277.432904] erofs: unmounted for /dev/loop5 [ 277.508052] erofs: read_super, device -> /dev/loop3 [ 277.513344] erofs: read_super, device -> /dev/loop2 [ 277.521071] erofs: options -> [ 277.522233] erofs: read_super, device -> /dev/loop4 [ 277.524538] erofs: options -> acl,noacl, [ 277.537128] erofs: root inode @ nid 36 [ 277.546141] erofs: mounted on /dev/loop2 with opts: . [ 277.548728] erofs: options -> [ 277.560868] erofs: blksize 1 isn't supported on this platform [ 277.576190] erofs: read_super, device -> /dev/loop0 [ 277.606744] FAULT_INJECTION: forcing a failure. [ 277.606744] name failslab, interval 1, probability 0, space 0, times 0 [ 277.616041] erofs: read_super, device -> /dev/loop5 [ 277.635898] erofs: options -> [ 277.639233] erofs: options -> acl,noacl, [ 277.649833] CPU: 0 PID: 17997 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 277.650345] erofs: root inode @ nid 36 [ 277.657743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.657750] Call Trace: [ 277.657776] dump_stack+0x1fc/0x2ef [ 277.657794] should_fail.cold+0xa/0xf [ 277.657812] ? setup_fault_attr+0x200/0x200 [ 277.657828] ? lock_acquire+0x170/0x3c0 [ 277.657849] __should_failslab+0x115/0x180 [ 277.657864] should_failslab+0x5/0x10 [ 277.657879] __kmalloc_track_caller+0x2a6/0x3c0 05:49:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f323c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x415, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xce26, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 277.657894] ? strndup_user+0x70/0x120 [ 277.657906] ? _copy_from_user+0xd2/0x130 [ 277.657925] memdup_user+0x22/0xb0 [ 277.657941] strndup_user+0x70/0x120 [ 277.657964] ksys_mount+0x6f/0x130 [ 277.657982] __x64_sys_mount+0xba/0x150 [ 277.657998] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 277.658010] do_syscall_64+0xf9/0x620 [ 277.658027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.672946] erofs: root inode @ nid 36 [ 277.673870] RIP: 0033:0x46702a [ 277.682585] erofs: mounted on /dev/loop0 with opts: . [ 277.685579] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.685589] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 277.685603] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 277.685610] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 277.685617] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 277.685625] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 277.685633] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 277.704121] erofs: unmounted for /dev/loop2 [ 277.720254] erofs: mounted on /dev/loop5 with opts: acl. [ 277.727062] erofs: unmounted for /dev/loop3 05:49:30 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 278.046814] erofs: unmounted for /dev/loop5 [ 278.051371] erofs: unmounted for /dev/loop0 [ 278.122425] erofs: read_super, device -> /dev/loop0 [ 278.133134] erofs: options -> [ 278.137368] erofs: root inode @ nid 36 [ 278.140170] erofs: read_super, device -> /dev/loop4 [ 278.141943] erofs: mounted on /dev/loop0 with opts: . [ 278.149922] erofs: options -> [ 278.159799] FAULT_INJECTION: forcing a failure. [ 278.159799] name failslab, interval 1, probability 0, space 0, times 0 [ 278.162655] erofs: read_super, device -> /dev/loop3 [ 278.176053] CPU: 0 PID: 18023 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 278.180300] erofs: read_super, device -> /dev/loop2 [ 278.184091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.184098] Call Trace: [ 278.184121] dump_stack+0x1fc/0x2ef [ 278.184138] should_fail.cold+0xa/0xf [ 278.208482] ? setup_fault_attr+0x200/0x200 [ 278.212825] ? lock_acquire+0x170/0x3c0 [ 278.213158] erofs: options -> [ 278.216815] __should_failslab+0x115/0x180 [ 278.216835] should_failslab+0x5/0x10 [ 278.216849] kmem_cache_alloc_trace+0x284/0x380 [ 278.216862] ? _copy_from_user+0xd2/0x130 [ 278.216879] copy_mount_options+0x59/0x380 [ 278.216897] ksys_mount+0x9b/0x130 [ 278.216913] __x64_sys_mount+0xba/0x150 [ 278.216928] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 278.216944] do_syscall_64+0xf9/0x620 [ 278.257028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.262233] RIP: 0033:0x46702a [ 278.265436] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.267832] erofs: root inode @ nid 36 [ 278.284364] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 278.284379] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 278.284388] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 278.284397] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 278.284406] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 278.284413] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 278.291061] erofs: options -> acl,noacl, [ 278.306679] erofs: blksize 1 isn't supported on this platform [ 278.323934] erofs: mounted on /dev/loop2 with opts: . [ 278.359168] erofs: read_super, device -> /dev/loop5 [ 278.364218] erofs: options -> acl,noacl, [ 278.368756] erofs: root inode @ nid 36 05:49:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 278.372907] erofs: mounted on /dev/loop5 with opts: acl. 05:49:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f325c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:30 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 278.411770] erofs: unmounted for /dev/loop2 [ 278.419673] erofs: unmounted for /dev/loop3 [ 278.431188] erofs: unmounted for /dev/loop0 [ 278.497403] erofs: read_super, device -> /dev/loop4 [ 278.521876] erofs: options -> 05:49:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 278.551290] erofs: blksize 1 isn't supported on this platform [ 278.558989] erofs: read_super, device -> /dev/loop3 [ 278.574471] erofs: unmounted for /dev/loop5 [ 278.577556] erofs: options -> acl,noacl, [ 278.589101] erofs: read_super, device -> /dev/loop2 [ 278.594151] erofs: options -> [ 278.602767] erofs: root inode @ nid 36 [ 278.608692] erofs: mounted on /dev/loop2 with opts: . 05:49:30 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 278.668164] erofs: read_super, device -> /dev/loop0 [ 278.675010] erofs: options -> [ 278.679592] erofs: root inode @ nid 36 [ 278.683681] erofs: mounted on /dev/loop0 with opts: . [ 278.732408] FAULT_INJECTION: forcing a failure. [ 278.732408] name failslab, interval 1, probability 0, space 0, times 0 [ 278.743796] CPU: 0 PID: 18061 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 278.751696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.761063] Call Trace: [ 278.763674] dump_stack+0x1fc/0x2ef [ 278.767322] should_fail.cold+0xa/0xf [ 278.771141] ? setup_fault_attr+0x200/0x200 [ 278.775479] ? lock_acquire+0x170/0x3c0 [ 278.779477] __should_failslab+0x115/0x180 [ 278.783731] should_failslab+0x5/0x10 [ 278.787546] kmem_cache_alloc_trace+0x284/0x380 [ 278.792227] ? _copy_from_user+0xd2/0x130 [ 278.796393] copy_mount_options+0x59/0x380 [ 278.800649] ksys_mount+0x9b/0x130 [ 278.804207] __x64_sys_mount+0xba/0x150 [ 278.808200] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 278.812798] do_syscall_64+0xf9/0x620 [ 278.816616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.821811] RIP: 0033:0x46702a 05:49:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf703, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 278.825013] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.844054] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 278.851778] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 278.852228] erofs: read_super, device -> /dev/loop4 [ 278.859050] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 278.859059] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 05:49:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f32bc56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 278.859066] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 278.859075] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 278.896996] erofs: unmounted for /dev/loop0 [ 278.902359] erofs: unmounted for /dev/loop2 [ 278.906950] erofs: unmounted for /dev/loop3 [ 278.921723] erofs: options -> [ 278.925281] erofs: blksize 1 isn't supported on this platform [ 279.068822] erofs: read_super, device -> /dev/loop5 [ 279.075954] erofs: read_super, device -> /dev/loop0 [ 279.094118] erofs: options -> acl,noacl, [ 279.105682] erofs: options -> 05:49:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:31 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 279.116287] erofs: root inode @ nid 36 [ 279.126164] erofs: root inode @ nid 36 [ 279.136153] erofs: mounted on /dev/loop5 with opts: acl. [ 279.152623] erofs: mounted on /dev/loop0 with opts: . 05:49:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 279.215096] erofs: read_super, device -> /dev/loop3 [ 279.220865] erofs: read_super, device -> /dev/loop2 [ 279.231911] erofs: unmounted for /dev/loop5 [ 279.240397] erofs: options -> acl,noacl, [ 279.244614] erofs: unmounted for /dev/loop0 [ 279.245272] erofs: options -> [ 279.255518] erofs: root inode @ nid 36 [ 279.259897] erofs: mounted on /dev/loop2 with opts: . [ 279.304014] FAULT_INJECTION: forcing a failure. [ 279.304014] name failslab, interval 1, probability 0, space 0, times 0 [ 279.323068] erofs: read_super, device -> /dev/loop4 05:49:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f32dc56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 279.357677] CPU: 0 PID: 18103 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 279.364415] erofs: options -> [ 279.365593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.365600] Call Trace: [ 279.365626] dump_stack+0x1fc/0x2ef [ 279.365642] should_fail.cold+0xa/0xf [ 279.365660] ? setup_fault_attr+0x200/0x200 [ 279.389685] erofs: blksize 1 isn't supported on this platform [ 279.392483] ? lock_acquire+0x170/0x3c0 [ 279.392508] __should_failslab+0x115/0x180 05:49:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 279.392526] should_failslab+0x5/0x10 [ 279.392542] __kmalloc_track_caller+0x2a6/0x3c0 [ 279.415063] ? kstrdup_const+0x53/0x80 [ 279.418955] kstrdup+0x36/0x70 [ 279.422151] kstrdup_const+0x53/0x80 [ 279.425875] alloc_vfsmnt+0xb5/0x780 [ 279.429601] ? _raw_read_unlock+0x29/0x40 [ 279.433764] vfs_kern_mount.part.0+0x27/0x470 [ 279.438275] do_mount+0x113c/0x2f10 [ 279.441915] ? cmp_ex_sort+0xc0/0xc0 [ 279.445642] ? __do_page_fault+0x180/0xd60 [ 279.449889] ? copy_mount_string+0x40/0x40 [ 279.454143] ? memset+0x20/0x40 [ 279.457437] ? copy_mount_options+0x26f/0x380 [ 279.461946] ksys_mount+0xcf/0x130 [ 279.465497] __x64_sys_mount+0xba/0x150 [ 279.469490] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 279.474085] do_syscall_64+0xf9/0x620 [ 279.477874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.483045] RIP: 0033:0x46702a [ 279.486220] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 279.505175] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 279.512870] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 279.520199] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 279.527475] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 279.534749] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 279.542014] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 279.557046] erofs: unmounted for /dev/loop3 [ 279.561519] erofs: unmounted for /dev/loop2 05:49:31 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 279.614795] erofs: read_super, device -> /dev/loop5 [ 279.623473] erofs: options -> acl,noacl, [ 279.641932] erofs: root inode @ nid 36 [ 279.648569] erofs: read_super, device -> /dev/loop0 [ 279.654992] erofs: read_super, device -> /dev/loop4 [ 279.665420] erofs: options -> [ 279.672027] erofs: mounted on /dev/loop5 with opts: acl. [ 279.673287] erofs: options -> [ 279.681966] erofs: root inode @ nid 36 [ 279.682689] erofs: blksize 1 isn't supported on this platform [ 279.686082] erofs: mounted on /dev/loop0 with opts: . 05:49:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 279.746900] erofs: read_super, device -> /dev/loop3 [ 279.748776] erofs: read_super, device -> /dev/loop2 [ 279.756716] erofs: options -> acl,noacl, [ 279.773696] erofs: options -> [ 279.782056] erofs: root inode @ nid 36 [ 279.789518] erofs: mounted on /dev/loop2 with opts: . 05:49:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 279.794983] erofs: unmounted for /dev/loop0 [ 279.802394] erofs: unmounted for /dev/loop5 [ 279.819854] FAULT_INJECTION: forcing a failure. [ 279.819854] name failslab, interval 1, probability 0, space 0, times 0 [ 279.832010] CPU: 0 PID: 18137 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 279.839906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.849268] Call Trace: [ 279.851878] dump_stack+0x1fc/0x2ef [ 279.855523] should_fail.cold+0xa/0xf [ 279.859339] ? setup_fault_attr+0x200/0x200 [ 279.863675] ? lock_acquire+0x170/0x3c0 [ 279.867677] __should_failslab+0x115/0x180 [ 279.871924] should_failslab+0x5/0x10 [ 279.875730] kmem_cache_alloc+0x277/0x370 [ 279.879890] alloc_vfsmnt+0x23/0x780 [ 279.883644] ? _raw_read_unlock+0x29/0x40 [ 279.887803] vfs_kern_mount.part.0+0x27/0x470 [ 279.892306] do_mount+0x113c/0x2f10 [ 279.895924] ? cmp_ex_sort+0xc0/0xc0 [ 279.899627] ? __do_page_fault+0x180/0xd60 [ 279.903852] ? copy_mount_string+0x40/0x40 [ 279.908079] ? memset+0x20/0x40 [ 279.911348] ? copy_mount_options+0x26f/0x380 [ 279.915832] ksys_mount+0xcf/0x130 [ 279.919363] __x64_sys_mount+0xba/0x150 [ 279.923326] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 279.927896] do_syscall_64+0xf9/0x620 [ 279.931688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.936867] RIP: 0033:0x46702a [ 279.940047] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 279.958934] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 279.966633] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 279.973907] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 279.981164] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 279.988420] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 279.995674] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f330c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 280.058835] erofs: unmounted for /dev/loop2 [ 280.072900] erofs: unmounted for /dev/loop3 [ 280.187769] erofs: read_super, device -> /dev/loop4 [ 280.193058] erofs: options -> [ 280.196642] erofs: blksize 1 isn't supported on this platform 05:49:32 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 280.238174] erofs: read_super, device -> /dev/loop0 [ 280.254440] erofs: options -> [ 280.262138] erofs: root inode @ nid 36 [ 280.266697] erofs: mounted on /dev/loop0 with opts: . [ 280.285711] erofs: read_super, device -> /dev/loop5 [ 280.288370] erofs: read_super, device -> /dev/loop3 [ 280.295944] erofs: options -> acl,noacl, [ 280.302815] erofs: options -> acl,noacl, [ 280.304562] erofs: read_super, device -> /dev/loop4 [ 280.312053] erofs: options -> [ 280.315575] erofs: blksize 1 isn't supported on this platform 05:49:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f337c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 280.339419] erofs: root inode @ nid 36 [ 280.345460] erofs: mounted on /dev/loop5 with opts: acl. [ 280.355064] erofs: unmounted for /dev/loop0 [ 280.367728] erofs: unmounted for /dev/loop3 [ 280.432296] erofs: read_super, device -> /dev/loop2 [ 280.437504] erofs: options -> [ 280.439415] FAULT_INJECTION: forcing a failure. [ 280.439415] name failslab, interval 1, probability 0, space 0, times 0 [ 280.454706] erofs: root inode @ nid 36 [ 280.465398] erofs: mounted on /dev/loop2 with opts: . [ 280.494710] CPU: 0 PID: 18170 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 280.502632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.511998] Call Trace: [ 280.514603] dump_stack+0x1fc/0x2ef [ 280.518247] should_fail.cold+0xa/0xf [ 280.522057] ? setup_fault_attr+0x200/0x200 [ 280.526384] ? lock_acquire+0x170/0x3c0 [ 280.530375] __should_failslab+0x115/0x180 [ 280.534619] should_failslab+0x5/0x10 [ 280.538429] kmem_cache_alloc+0x277/0x370 [ 280.542590] alloc_vfsmnt+0x23/0x780 [ 280.546321] ? _raw_read_unlock+0x29/0x40 [ 280.550485] vfs_kern_mount.part.0+0x27/0x470 [ 280.554997] do_mount+0x113c/0x2f10 [ 280.558635] ? cmp_ex_sort+0xc0/0xc0 [ 280.562361] ? __do_page_fault+0x180/0xd60 [ 280.566606] ? copy_mount_string+0x40/0x40 [ 280.570859] ? memset+0x20/0x40 [ 280.574149] ? copy_mount_options+0x26f/0x380 [ 280.578661] ksys_mount+0xcf/0x130 [ 280.582209] __x64_sys_mount+0xba/0x150 [ 280.587230] ? lockdep_hardirqs_on+0x3a8/0x5c0 05:49:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 280.591822] do_syscall_64+0xf9/0x620 [ 280.595633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.600824] RIP: 0033:0x46702a [ 280.604024] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 280.622933] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 280.630692] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 280.637978] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 280.645264] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 280.652553] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 280.659383] erofs: read_super, device -> /dev/loop3 [ 280.659831] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 280.665004] erofs: options -> acl,noacl, [ 280.676441] erofs: unmounted for /dev/loop5 [ 280.689694] erofs: read_super, device -> /dev/loop4 05:49:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 280.694746] erofs: options -> [ 280.704344] erofs: read_super, device -> /dev/loop0 [ 280.722064] erofs: unmounted for /dev/loop2 [ 280.732218] erofs: options -> [ 280.733581] erofs: blksize 1 isn't supported on this platform [ 280.735706] erofs: root inode @ nid 36 [ 280.749989] erofs: mounted on /dev/loop0 with opts: . [ 280.938796] erofs: read_super, device -> /dev/loop2 05:49:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x704, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:33 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 280.963707] erofs: options -> [ 280.976441] erofs: root inode @ nid 36 [ 280.985830] erofs: mounted on /dev/loop2 with opts: . [ 281.007379] erofs: unmounted for /dev/loop0 05:49:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f363c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 281.048295] FAULT_INJECTION: forcing a failure. [ 281.048295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.063160] erofs: unmounted for /dev/loop3 [ 281.082286] CPU: 1 PID: 18207 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 05:49:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 281.090206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.099567] Call Trace: [ 281.102180] dump_stack+0x1fc/0x2ef [ 281.105824] should_fail.cold+0xa/0xf [ 281.109636] ? lock_acquire+0x170/0x3c0 [ 281.113751] ? setup_fault_attr+0x200/0x200 [ 281.118135] __alloc_pages_nodemask+0x239/0x2890 [ 281.122942] ? _raw_spin_unlock_irq+0x5a/0x80 [ 281.127420] ? finish_task_switch+0x146/0x760 [ 281.131895] ? finish_task_switch+0x118/0x760 [ 281.136375] ? pcpu_alloc+0xe78/0x1190 [ 281.140249] ? io_schedule_timeout+0x140/0x140 [ 281.144814] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 281.149642] ? preempt_schedule_common+0x45/0xc0 [ 281.154391] ? check_preemption_disabled+0x41/0x280 [ 281.159404] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 281.164402] ? pcpu_alloc+0xc9/0x1190 [ 281.168189] alloc_pages_current+0x193/0x2a0 [ 281.172579] ? __lockdep_init_map+0x100/0x5a0 [ 281.177071] get_zeroed_page+0x10/0x40 [ 281.180942] mount_fs+0x203/0x310 [ 281.184381] vfs_kern_mount.part.0+0x68/0x470 [ 281.188861] do_mount+0x113c/0x2f10 [ 281.192470] ? cmp_ex_sort+0xc0/0xc0 [ 281.196169] ? __do_page_fault+0x180/0xd60 [ 281.200390] ? copy_mount_string+0x40/0x40 [ 281.204612] ? memset+0x20/0x40 [ 281.207874] ? copy_mount_options+0x26f/0x380 [ 281.212362] ksys_mount+0xcf/0x130 [ 281.215892] __x64_sys_mount+0xba/0x150 [ 281.219851] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 281.224438] do_syscall_64+0xf9/0x620 [ 281.228226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.233412] RIP: 0033:0x46702a [ 281.236630] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.255554] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 281.263284] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 281.270534] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 281.277786] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 281.285037] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 281.292290] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 281.303093] erofs: unmounted for /dev/loop2 [ 281.318153] erofs: read_super, device -> /dev/loop5 [ 281.331109] erofs: options -> acl,noacl, [ 281.338640] erofs: root inode @ nid 36 [ 281.345994] erofs: mounted on /dev/loop5 with opts: acl. [ 281.397826] erofs: read_super, device -> /dev/loop3 [ 281.406422] erofs: options -> acl,noacl, [ 281.418369] erofs: read_super, device -> /dev/loop4 [ 281.423567] erofs: options -> [ 281.426985] erofs: blksize 1 isn't supported on this platform 05:49:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 281.464197] erofs: read_super, device -> /dev/loop0 [ 281.482244] erofs: read_super, device -> /dev/loop2 [ 281.498973] erofs: unmounted for /dev/loop5 05:49:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x804, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f364c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:33 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 281.512609] erofs: options -> [ 281.521605] erofs: root inode @ nid 36 [ 281.523239] erofs: options -> [ 281.525988] erofs: mounted on /dev/loop2 with opts: . 05:49:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 281.577351] erofs: unmounted for /dev/loop3 [ 281.577997] erofs: root inode @ nid 36 [ 281.615332] erofs: mounted on /dev/loop0 with opts: . [ 281.632252] erofs: unmounted for /dev/loop2 [ 281.707959] erofs: read_super, device -> /dev/loop4 [ 281.708524] FAULT_INJECTION: forcing a failure. [ 281.708524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.713017] erofs: options -> [ 281.724802] CPU: 1 PID: 18241 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 281.724811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.724816] Call Trace: [ 281.724841] dump_stack+0x1fc/0x2ef [ 281.724859] should_fail.cold+0xa/0xf [ 281.724877] ? setup_fault_attr+0x200/0x200 [ 281.724891] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 281.724908] ? mark_held_locks+0xf0/0xf0 [ 281.724922] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 281.724941] __alloc_pages_nodemask+0x239/0x2890 [ 281.724959] ? __lock_acquire+0x6de/0x3ff0 [ 281.724975] ? __lock_acquire+0x6de/0x3ff0 [ 281.724994] ? __lock_acquire+0x6de/0x3ff0 [ 281.725009] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 281.725026] ? mark_held_locks+0xf0/0xf0 [ 281.725047] ? mark_held_locks+0xf0/0xf0 [ 281.725061] ? lock_downgrade+0x720/0x720 [ 281.725073] ? blkdev_get+0x4ce/0x940 [ 281.725093] cache_grow_begin+0xa4/0x8a0 [ 281.728943] erofs: read_super, device -> /dev/loop2 [ 281.736149] ? setup_fault_attr+0x200/0x200 [ 281.736164] ? lock_acquire+0x170/0x3c0 [ 281.736184] cache_alloc_refill+0x273/0x340 [ 281.745620] erofs: options -> [ 281.748113] kmem_cache_alloc_trace+0x354/0x380 [ 281.748130] ? set_bdev_super+0x110/0x110 [ 281.748147] ? ns_test_super+0x50/0x50 [ 281.751844] erofs: blksize 1 isn't supported on this platform [ 281.755536] sget_userns+0x122/0xcd0 [ 281.755550] ? set_bdev_super+0x110/0x110 [ 281.755570] ? ns_test_super+0x50/0x50 [ 281.760208] erofs: root inode @ nid 36 [ 281.764961] ? set_bdev_super+0x110/0x110 [ 281.764974] ? ns_test_super+0x50/0x50 [ 281.764989] sget+0x102/0x140 [ 281.769504] erofs: mounted on /dev/loop2 with opts: . [ 281.773597] mount_bdev+0xf8/0x3b0 [ 281.773615] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 281.773632] erofs_mount+0x8c/0xc0 [ 281.797878] erofs: read_super, device -> /dev/loop5 [ 281.799958] ? erofs_kill_sb+0x20/0x20 [ 281.799979] ? alloc_pages_current+0x19b/0x2a0 [ 281.804033] erofs: options -> acl,noacl, [ 281.808170] ? __lockdep_init_map+0x100/0x5a0 [ 281.808185] mount_fs+0xa3/0x310 [ 281.808204] vfs_kern_mount.part.0+0x68/0x470 [ 281.808221] do_mount+0x113c/0x2f10 [ 281.818208] erofs: read_super, device -> /dev/loop3 [ 281.821053] ? cmp_ex_sort+0xc0/0xc0 [ 281.821075] ? __do_page_fault+0x180/0xd60 [ 281.827538] erofs: options -> acl,noacl, [ 281.829361] ? copy_mount_string+0x40/0x40 [ 281.829382] ? memset+0x20/0x40 [ 281.829399] ? copy_mount_options+0x26f/0x380 [ 281.868076] erofs: root inode @ nid 36 [ 281.871156] ksys_mount+0xcf/0x130 [ 281.875371] erofs: mounted on /dev/loop5 with opts: acl. [ 281.879160] __x64_sys_mount+0xba/0x150 [ 281.879176] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 281.879189] do_syscall_64+0xf9/0x620 [ 281.879209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.992904] RIP: 0033:0x46702a 05:49:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d020000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 281.996086] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.014991] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 282.022689] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 282.029945] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 282.037203] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 282.044458] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 282.051719] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 282.073517] erofs: unmounted for /dev/loop3 [ 282.077353] erofs: read_super, device -> /dev/loop1 [ 282.083179] erofs: unmounted for /dev/loop0 [ 282.083593] erofs: options -> acl,noacl, [ 282.087678] erofs: unmounted for /dev/loop2 [ 282.233583] erofs: read_super, device -> /dev/loop2 05:49:34 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 282.260414] erofs: read_super, device -> /dev/loop4 [ 282.265472] erofs: options -> [ 282.266675] erofs: options -> [ 282.276852] erofs: read_super, device -> /dev/loop3 [ 282.282634] erofs: options -> acl,noacl, [ 282.287778] erofs: unmounted for /dev/loop1 [ 282.298718] erofs: root inode @ nid 36 [ 282.302752] erofs: blksize 1 isn't supported on this platform 05:49:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d030000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 282.309224] erofs: unmounted for /dev/loop5 [ 282.314475] erofs: mounted on /dev/loop2 with opts: . [ 282.362395] erofs: unmounted for /dev/loop3 [ 282.398279] erofs: read_super, device -> /dev/loop0 [ 282.403348] erofs: options -> [ 282.416247] erofs: root inode @ nid 36 [ 282.421095] erofs: mounted on /dev/loop0 with opts: . [ 282.437355] FAULT_INJECTION: forcing a failure. [ 282.437355] name failslab, interval 1, probability 0, space 0, times 0 [ 282.487722] CPU: 0 PID: 18285 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 282.495641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.505000] Call Trace: [ 282.507605] dump_stack+0x1fc/0x2ef [ 282.511250] should_fail.cold+0xa/0xf [ 282.515051] ? setup_fault_attr+0x200/0x200 [ 282.519377] ? lock_acquire+0x170/0x3c0 [ 282.523365] __should_failslab+0x115/0x180 [ 282.527598] should_failslab+0x5/0x10 [ 282.531397] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 282.536501] __kmalloc_node+0x38/0x70 [ 282.540290] kvmalloc_node+0x61/0xf0 [ 282.543987] __list_lru_init+0x4c6/0x7f0 [ 282.548038] ? up_read+0xa3/0x110 [ 282.551499] sget_userns+0x7e2/0xcd0 [ 282.555204] ? set_bdev_super+0x110/0x110 [ 282.559336] ? ns_test_super+0x50/0x50 [ 282.563206] ? set_bdev_super+0x110/0x110 [ 282.567334] ? ns_test_super+0x50/0x50 [ 282.571213] sget+0x102/0x140 [ 282.574384] mount_bdev+0xf8/0x3b0 [ 282.577907] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 282.583169] erofs_mount+0x8c/0xc0 [ 282.586878] ? erofs_kill_sb+0x20/0x20 [ 282.590766] ? alloc_pages_current+0x19b/0x2a0 [ 282.595359] ? __lockdep_init_map+0x100/0x5a0 [ 282.599849] mount_fs+0xa3/0x310 [ 282.603199] vfs_kern_mount.part.0+0x68/0x470 [ 282.607696] do_mount+0x113c/0x2f10 [ 282.611332] ? cmp_ex_sort+0xc0/0xc0 [ 282.615048] ? __do_page_fault+0x180/0xd60 [ 282.619270] ? copy_mount_string+0x40/0x40 [ 282.623493] ? memset+0x20/0x40 [ 282.626759] ? copy_mount_options+0x26f/0x380 [ 282.631255] ksys_mount+0xcf/0x130 [ 282.634799] __x64_sys_mount+0xba/0x150 [ 282.638771] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 282.643343] do_syscall_64+0xf9/0x620 [ 282.647129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.652309] RIP: 0033:0x46702a [ 282.655495] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.674381] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:49:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x904, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 282.682073] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 282.689332] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 282.696657] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 282.703910] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 282.711174] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 282.732677] erofs: unmounted for /dev/loop0 [ 282.749842] erofs: unmounted for /dev/loop2 [ 282.760922] erofs: read_super, device -> /dev/loop5 [ 282.766102] erofs: options -> acl,noacl, [ 282.775899] erofs: root inode @ nid 36 [ 282.780269] erofs: mounted on /dev/loop5 with opts: acl. [ 282.879114] erofs: read_super, device -> /dev/loop3 [ 282.890627] erofs: options -> acl,noacl, [ 282.903299] erofs: read_super, device -> /dev/loop4 [ 282.909849] erofs: options -> 05:49:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:35 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 282.926738] erofs: blksize 1 isn't supported on this platform 05:49:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 282.957000] erofs: unmounted for /dev/loop5 [ 282.969837] erofs: unmounted for /dev/loop3 [ 282.991758] erofs: read_super, device -> /dev/loop2 [ 282.996801] erofs: options -> [ 283.001337] erofs: root inode @ nid 36 [ 283.005517] erofs: mounted on /dev/loop2 with opts: . [ 283.072099] erofs: read_super, device -> /dev/loop0 [ 283.080987] FAULT_INJECTION: forcing a failure. [ 283.080987] name failslab, interval 1, probability 0, space 0, times 0 [ 283.099669] erofs: options -> 05:49:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 283.120243] erofs: read_super, device -> /dev/loop4 [ 283.141817] erofs: unmounted for /dev/loop2 [ 283.150569] erofs: options -> [ 283.161795] erofs: root inode @ nid 36 [ 283.165824] CPU: 1 PID: 18318 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 283.173720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.175311] erofs: mounted on /dev/loop0 with opts: . [ 283.183103] Call Trace: [ 283.183129] dump_stack+0x1fc/0x2ef [ 283.183146] should_fail.cold+0xa/0xf [ 283.183163] ? setup_fault_attr+0x200/0x200 [ 283.183178] ? lock_acquire+0x170/0x3c0 [ 283.183197] __should_failslab+0x115/0x180 [ 283.205837] erofs: blksize 1 isn't supported on this platform [ 283.206623] should_failslab+0x5/0x10 [ 283.220489] __kmalloc+0x2ab/0x3c0 [ 283.224077] ? prealloc_shrinker+0x15d/0x340 [ 283.228475] prealloc_shrinker+0x15d/0x340 [ 283.232699] sget_userns+0x7b4/0xcd0 [ 283.236394] ? set_bdev_super+0x110/0x110 [ 283.240562] ? ns_test_super+0x50/0x50 [ 283.244432] ? set_bdev_super+0x110/0x110 [ 283.248561] ? ns_test_super+0x50/0x50 [ 283.252432] sget+0x102/0x140 [ 283.255534] mount_bdev+0xf8/0x3b0 [ 283.259065] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 283.264326] erofs_mount+0x8c/0xc0 [ 283.267848] ? erofs_kill_sb+0x20/0x20 [ 283.271719] ? alloc_pages_current+0x19b/0x2a0 [ 283.276295] ? __lockdep_init_map+0x100/0x5a0 [ 283.280780] mount_fs+0xa3/0x310 [ 283.284131] vfs_kern_mount.part.0+0x68/0x470 [ 283.288641] do_mount+0x113c/0x2f10 [ 283.292252] ? cmp_ex_sort+0xc0/0xc0 [ 283.295953] ? __do_page_fault+0x180/0xd60 [ 283.300201] ? copy_mount_string+0x40/0x40 [ 283.304423] ? memset+0x20/0x40 [ 283.307686] ? copy_mount_options+0x26f/0x380 [ 283.312165] ksys_mount+0xcf/0x130 [ 283.315698] __x64_sys_mount+0xba/0x150 [ 283.319657] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 283.324224] do_syscall_64+0xf9/0x620 [ 283.328009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.333186] RIP: 0033:0x46702a [ 283.336372] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.355258] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 283.363073] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 283.370340] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 283.377593] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 283.384855] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 283.392110] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 283.414742] erofs: read_super, device -> /dev/loop5 [ 283.420237] erofs: options -> acl,noacl, [ 283.424958] erofs: root inode @ nid 36 [ 283.440186] erofs: mounted on /dev/loop5 with opts: acl. [ 283.469536] erofs: read_super, device -> /dev/loop3 [ 283.474730] erofs: options -> acl,noacl, 05:49:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 283.543723] erofs: read_super, device -> /dev/loop2 05:49:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xa04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:35 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 283.569927] erofs: unmounted for /dev/loop0 [ 283.577170] erofs: options -> [ 283.582505] erofs: unmounted for /dev/loop5 [ 283.600091] erofs: root inode @ nid 36 05:49:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d050000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 283.620962] erofs: mounted on /dev/loop2 with opts: . [ 283.627158] erofs: unmounted for /dev/loop3 [ 283.747490] FAULT_INJECTION: forcing a failure. [ 283.747490] name failslab, interval 1, probability 0, space 0, times 0 [ 283.759485] CPU: 0 PID: 18351 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 283.767384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.776751] Call Trace: [ 283.779367] dump_stack+0x1fc/0x2ef [ 283.782995] should_fail.cold+0xa/0xf [ 283.786075] erofs: read_super, device -> /dev/loop0 [ 283.786792] ? setup_fault_attr+0x200/0x200 [ 283.796112] ? lock_acquire+0x170/0x3c0 [ 283.800103] __should_failslab+0x115/0x180 [ 283.801444] erofs: read_super, device -> /dev/loop5 [ 283.804343] should_failslab+0x5/0x10 [ 283.804355] __kmalloc+0x2ab/0x3c0 [ 283.804372] ? prealloc_shrinker+0x15d/0x340 [ 283.821131] prealloc_shrinker+0x15d/0x340 [ 283.821158] erofs: options -> [ 283.825381] sget_userns+0x7b4/0xcd0 [ 283.825397] ? set_bdev_super+0x110/0x110 [ 283.825417] ? ns_test_super+0x50/0x50 [ 283.825437] ? set_bdev_super+0x110/0x110 [ 283.845105] erofs: options -> acl,noacl, [ 283.845149] ? ns_test_super+0x50/0x50 [ 283.853123] sget+0x102/0x140 [ 283.855556] erofs: root inode @ nid 36 [ 283.856240] mount_bdev+0xf8/0x3b0 [ 283.856261] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 283.856277] erofs_mount+0x8c/0xc0 [ 283.856292] ? erofs_kill_sb+0x20/0x20 [ 283.867863] erofs: root inode @ nid 36 [ 283.868970] ? alloc_pages_current+0x19b/0x2a0 [ 283.868987] ? __lockdep_init_map+0x100/0x5a0 [ 283.869003] mount_fs+0xa3/0x310 [ 283.869021] vfs_kern_mount.part.0+0x68/0x470 [ 283.869039] do_mount+0x113c/0x2f10 [ 283.869055] ? cmp_ex_sort+0xc0/0xc0 [ 283.869073] ? __do_page_fault+0x180/0xd60 [ 283.869092] ? copy_mount_string+0x40/0x40 [ 283.877816] erofs: mounted on /dev/loop5 with opts: acl. [ 283.880388] ? memset+0x20/0x40 [ 283.880407] ? copy_mount_options+0x26f/0x380 [ 283.880424] ksys_mount+0xcf/0x130 [ 283.880441] __x64_sys_mount+0xba/0x150 [ 283.880458] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 283.880472] do_syscall_64+0xf9/0x620 [ 283.880490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.880501] RIP: 0033:0x46702a [ 283.880514] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.880521] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 283.880534] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 283.880541] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 05:49:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 283.880553] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 283.888626] erofs: mounted on /dev/loop0 with opts: . [ 283.889619] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 283.889627] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 283.979649] erofs: read_super, device -> /dev/loop4 [ 283.995530] erofs: read_super, device -> /dev/loop3 [ 284.019459] erofs: unmounted for /dev/loop5 05:49:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 284.046971] erofs: options -> [ 284.051013] erofs: blksize 1 isn't supported on this platform [ 284.073178] erofs: unmounted for /dev/loop2 [ 284.075181] erofs: options -> acl,noacl, 05:49:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xb04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 284.243368] erofs: read_super, device -> /dev/loop2 [ 284.248423] erofs: options -> [ 284.251336] erofs: read_super, device -> /dev/loop5 [ 284.261430] erofs: options -> acl,noacl, 05:49:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d070000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:36 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 284.295140] erofs: root inode @ nid 36 [ 284.298667] erofs: root inode @ nid 36 [ 284.303169] erofs: unmounted for /dev/loop0 [ 284.305946] erofs: mounted on /dev/loop5 with opts: acl. [ 284.319384] erofs: unmounted for /dev/loop3 [ 284.342595] erofs: mounted on /dev/loop2 with opts: . [ 284.426549] erofs: read_super, device -> /dev/loop4 05:49:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 284.447642] erofs: read_super, device -> /dev/loop3 [ 284.456342] erofs: options -> [ 284.463536] erofs: options -> acl,noacl, [ 284.472363] erofs: blksize 1 isn't supported on this platform [ 284.481990] erofs: unmounted for /dev/loop5 [ 284.486510] erofs: unmounted for /dev/loop2 05:49:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d080000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 284.618754] FAULT_INJECTION: forcing a failure. [ 284.618754] name failslab, interval 1, probability 0, space 0, times 0 [ 284.636947] erofs: read_super, device -> /dev/loop0 [ 284.641402] erofs: read_super, device -> /dev/loop4 [ 284.647149] erofs: options -> [ 284.652428] erofs: blksize 1 isn't supported on this platform [ 284.660773] CPU: 1 PID: 18404 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 284.668663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.674320] erofs: options -> [ 284.678015] Call Trace: [ 284.678043] dump_stack+0x1fc/0x2ef [ 284.678060] should_fail.cold+0xa/0xf [ 284.678078] ? setup_fault_attr+0x200/0x200 [ 284.695591] ? lock_acquire+0x170/0x3c0 [ 284.699581] __should_failslab+0x115/0x180 [ 284.703824] should_failslab+0x5/0x10 [ 284.707628] __kmalloc+0x2ab/0x3c0 [ 284.711170] ? __list_lru_init+0xd3/0x7f0 [ 284.715327] __list_lru_init+0xd3/0x7f0 [ 284.719316] ? up_write+0x18/0x150 [ 284.722861] sget_userns+0x7e2/0xcd0 [ 284.726577] ? set_bdev_super+0x110/0x110 [ 284.730731] ? ns_test_super+0x50/0x50 [ 284.734630] ? set_bdev_super+0x110/0x110 [ 284.738781] ? ns_test_super+0x50/0x50 [ 284.742671] sget+0x102/0x140 [ 284.745780] mount_bdev+0xf8/0x3b0 [ 284.749343] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 284.754623] erofs_mount+0x8c/0xc0 [ 284.758168] ? erofs_kill_sb+0x20/0x20 [ 284.762067] ? alloc_pages_current+0x19b/0x2a0 [ 284.766662] ? __lockdep_init_map+0x100/0x5a0 [ 284.771160] mount_fs+0xa3/0x310 [ 284.774535] vfs_kern_mount.part.0+0x68/0x470 [ 284.779036] do_mount+0x113c/0x2f10 [ 284.782667] ? cmp_ex_sort+0xc0/0xc0 [ 284.786386] ? __do_page_fault+0x180/0xd60 [ 284.790623] ? copy_mount_string+0x40/0x40 [ 284.794865] ? memset+0x20/0x40 [ 284.798155] ? copy_mount_options+0x26f/0x380 [ 284.802656] ksys_mount+0xcf/0x130 [ 284.806204] __x64_sys_mount+0xba/0x150 [ 284.810192] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 284.814776] do_syscall_64+0xf9/0x620 [ 284.818584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.823773] RIP: 0033:0x46702a [ 284.826970] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 284.845877] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 284.853608] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 284.860887] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 284.868164] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 284.875441] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 284.882727] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 284.894795] erofs: root inode @ nid 36 [ 284.901272] erofs: mounted on /dev/loop0 with opts: . [ 284.921658] erofs: unmounted for /dev/loop3 05:49:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 284.982345] erofs: unmounted for /dev/loop0 [ 285.047690] erofs: read_super, device -> /dev/loop5 [ 285.049554] erofs: read_super, device -> /dev/loop2 [ 285.057877] erofs: options -> acl,noacl, [ 285.083128] erofs: read_super, device -> /dev/loop3 [ 285.091910] erofs: root inode @ nid 36 [ 285.106350] erofs: mounted on /dev/loop5 with opts: acl. [ 285.134789] erofs: options -> acl,noacl, [ 285.150793] erofs: options -> 05:49:37 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 285.172623] erofs: root inode @ nid 36 [ 285.198532] erofs: mounted on /dev/loop2 with opts: . 05:49:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d100000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 285.220392] erofs: unmounted for /dev/loop5 [ 285.228177] erofs: read_super, device -> /dev/loop0 [ 285.243182] erofs: unmounted for /dev/loop3 [ 285.260199] erofs: options -> [ 285.273249] erofs: root inode @ nid 36 [ 285.281623] erofs: mounted on /dev/loop0 with opts: . [ 285.287573] erofs: read_super, device -> /dev/loop4 [ 285.305994] erofs: options -> [ 285.316062] erofs: blksize 1 isn't supported on this platform [ 285.322917] FAULT_INJECTION: forcing a failure. [ 285.322917] name failslab, interval 1, probability 0, space 0, times 0 [ 285.358443] CPU: 0 PID: 18443 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 285.366359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.375712] Call Trace: [ 285.378313] dump_stack+0x1fc/0x2ef [ 285.381960] should_fail.cold+0xa/0xf [ 285.385771] ? setup_fault_attr+0x200/0x200 [ 285.390097] ? lock_acquire+0x170/0x3c0 [ 285.394087] __should_failslab+0x115/0x180 [ 285.398326] should_failslab+0x5/0x10 [ 285.402133] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 285.407248] __kmalloc_node+0x38/0x70 [ 285.411057] kvmalloc_node+0x61/0xf0 [ 285.414778] __list_lru_init+0x4c6/0x7f0 [ 285.418844] ? up_read+0xa3/0x110 [ 285.422302] sget_userns+0x7e2/0xcd0 [ 285.426012] ? set_bdev_super+0x110/0x110 [ 285.430160] ? ns_test_super+0x50/0x50 [ 285.434052] ? set_bdev_super+0x110/0x110 [ 285.438196] ? ns_test_super+0x50/0x50 [ 285.442080] sget+0x102/0x140 [ 285.445193] mount_bdev+0xf8/0x3b0 [ 285.448735] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 285.454010] erofs_mount+0x8c/0xc0 [ 285.457549] ? erofs_kill_sb+0x20/0x20 [ 285.461449] ? alloc_pages_current+0x19b/0x2a0 [ 285.466038] ? __lockdep_init_map+0x100/0x5a0 [ 285.470538] mount_fs+0xa3/0x310 [ 285.473915] vfs_kern_mount.part.0+0x68/0x470 [ 285.478424] do_mount+0x113c/0x2f10 [ 285.482062] ? cmp_ex_sort+0xc0/0xc0 [ 285.485782] ? __do_page_fault+0x180/0xd60 [ 285.490022] ? copy_mount_string+0x40/0x40 [ 285.494271] ? memset+0x20/0x40 [ 285.497555] ? copy_mount_options+0x26f/0x380 [ 285.502067] ksys_mount+0xcf/0x130 [ 285.505616] __x64_sys_mount+0xba/0x150 [ 285.509598] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 285.514192] do_syscall_64+0xf9/0x620 [ 285.517999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.523190] RIP: 0033:0x46702a [ 285.526387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 285.545292] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 285.553019] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 285.560300] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 285.567577] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 285.574848] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 285.582125] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 285.624658] erofs: read_super, device -> /dev/loop5 [ 285.634800] erofs: options -> acl,noacl, [ 285.645997] erofs: root inode @ nid 36 [ 285.664623] erofs: read_super, device -> /dev/loop4 05:49:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 285.677838] erofs: options -> [ 285.678508] erofs: mounted on /dev/loop5 with opts: acl. [ 285.693443] erofs: unmounted for /dev/loop2 [ 285.698024] erofs: unmounted for /dev/loop0 [ 285.724033] erofs: blksize 1 isn't supported on this platform [ 285.785047] erofs: read_super, device -> /dev/loop3 [ 285.803411] erofs: options -> acl,noacl, [ 285.838583] erofs: unmounted for /dev/loop5 05:49:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 285.859232] erofs: read_super, device -> /dev/loop0 05:49:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d140000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 285.894713] erofs: options -> [ 285.901282] erofs: unmounted for /dev/loop3 [ 285.914783] erofs: root inode @ nid 36 [ 285.926900] erofs: mounted on /dev/loop0 with opts: . [ 286.021030] erofs: read_super, device -> /dev/loop2 [ 286.026526] erofs: options -> [ 286.034799] erofs: root inode @ nid 36 [ 286.045163] erofs: mounted on /dev/loop2 with opts: . 05:49:38 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 286.071054] erofs: read_super, device -> /dev/loop5 [ 286.080583] erofs: options -> acl,noacl, [ 286.091904] erofs: root inode @ nid 36 [ 286.105356] erofs: mounted on /dev/loop5 with opts: acl. 05:49:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x14040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 286.143580] erofs: read_super, device -> /dev/loop3 [ 286.174036] erofs: unmounted for /dev/loop0 05:49:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 286.199006] erofs: options -> acl,noacl, [ 286.206763] erofs: unmounted for /dev/loop2 [ 286.248829] erofs: unmounted for /dev/loop5 [ 286.292351] erofs: read_super, device -> /dev/loop0 [ 286.298489] erofs: options -> [ 286.302261] erofs: root inode @ nid 36 [ 286.306388] erofs: mounted on /dev/loop0 with opts: . [ 286.327415] FAULT_INJECTION: forcing a failure. [ 286.327415] name failslab, interval 1, probability 0, space 0, times 0 [ 286.338703] erofs: read_super, device -> /dev/loop4 [ 286.338711] erofs: options -> [ 286.344343] erofs: blksize 1 isn't supported on this platform [ 286.362967] erofs: read_super, device -> /dev/loop2 [ 286.368007] erofs: options -> [ 286.386634] erofs: root inode @ nid 36 05:49:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d250000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 286.399388] erofs: mounted on /dev/loop2 with opts: . [ 286.414583] CPU: 0 PID: 18490 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 286.422500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.429564] erofs: read_super, device -> /dev/loop4 [ 286.431854] Call Trace: [ 286.431880] dump_stack+0x1fc/0x2ef [ 286.431900] should_fail.cold+0xa/0xf [ 286.431916] ? setup_fault_attr+0x200/0x200 [ 286.431932] ? lock_acquire+0x170/0x3c0 [ 286.431950] __should_failslab+0x115/0x180 [ 286.431966] should_failslab+0x5/0x10 [ 286.431977] __kmalloc+0x2ab/0x3c0 [ 286.431993] ? __list_lru_init+0xd3/0x7f0 [ 286.437122] erofs: options -> [ 286.439580] __list_lru_init+0xd3/0x7f0 [ 286.439598] ? up_write+0x18/0x150 [ 286.439615] sget_userns+0x7e2/0xcd0 [ 286.439632] ? set_bdev_super+0x110/0x110 [ 286.461441] erofs: blksize 1 isn't supported on this platform [ 286.463331] ? ns_test_super+0x50/0x50 05:49:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x15040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 286.463350] ? set_bdev_super+0x110/0x110 [ 286.463360] ? ns_test_super+0x50/0x50 [ 286.463377] sget+0x102/0x140 [ 286.510427] mount_bdev+0xf8/0x3b0 [ 286.513984] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 286.519273] erofs_mount+0x8c/0xc0 [ 286.522835] ? erofs_kill_sb+0x20/0x20 [ 286.526742] ? alloc_pages_current+0x19b/0x2a0 [ 286.531332] ? __lockdep_init_map+0x100/0x5a0 [ 286.535844] mount_fs+0xa3/0x310 [ 286.539295] vfs_kern_mount.part.0+0x68/0x470 [ 286.543796] do_mount+0x113c/0x2f10 [ 286.547411] ? cmp_ex_sort+0xc0/0xc0 [ 286.551113] ? __do_page_fault+0x180/0xd60 [ 286.555332] ? copy_mount_string+0x40/0x40 [ 286.559555] ? memset+0x20/0x40 [ 286.562821] ? copy_mount_options+0x26f/0x380 [ 286.567303] ksys_mount+0xcf/0x130 [ 286.570830] __x64_sys_mount+0xba/0x150 [ 286.574801] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 286.579382] do_syscall_64+0xf9/0x620 [ 286.583178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.588350] RIP: 0033:0x46702a [ 286.591526] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 286.610474] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 286.618168] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 286.625419] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 286.632670] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 286.639923] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 05:49:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 286.647175] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 286.660323] erofs: unmounted for /dev/loop3 [ 286.669702] erofs: unmounted for /dev/loop2 [ 286.669780] erofs: unmounted for /dev/loop0 [ 286.682383] erofs: read_super, device -> /dev/loop5 [ 286.687422] erofs: options -> acl,noacl, 05:49:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xd04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 286.704945] erofs: root inode @ nid 36 [ 286.716163] erofs: mounted on /dev/loop5 with opts: acl. 05:49:38 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 286.800516] erofs: unmounted for /dev/loop5 [ 286.839238] erofs: read_super, device -> /dev/loop0 [ 286.844797] erofs: options -> [ 286.848335] erofs: root inode @ nid 36 [ 286.853318] erofs: mounted on /dev/loop0 with opts: . [ 286.858688] FAULT_INJECTION: forcing a failure. [ 286.858688] name failslab, interval 1, probability 0, space 0, times 0 [ 286.862548] erofs: read_super, device -> /dev/loop2 [ 286.876265] erofs: read_super, device -> /dev/loop4 [ 286.884848] erofs: read_super, device -> /dev/loop3 [ 286.904335] CPU: 1 PID: 18531 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 286.912270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.920260] erofs: options -> [ 286.921629] Call Trace: [ 286.921657] dump_stack+0x1fc/0x2ef [ 286.921677] should_fail.cold+0xa/0xf [ 286.921696] ? setup_fault_attr+0x200/0x200 [ 286.921711] ? lock_acquire+0x170/0x3c0 [ 286.921729] __should_failslab+0x115/0x180 [ 286.947349] should_failslab+0x5/0x10 [ 286.951140] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 286.956233] __kmalloc_node+0x38/0x70 [ 286.960026] kvmalloc_node+0x61/0xf0 [ 286.963747] __list_lru_init+0x4c6/0x7f0 [ 286.967809] ? up_read+0xa3/0x110 [ 286.971257] sget_userns+0x7e2/0xcd0 [ 286.974957] ? set_bdev_super+0x110/0x110 [ 286.979094] ? ns_test_super+0x50/0x50 [ 286.982971] ? set_bdev_super+0x110/0x110 [ 286.987103] ? ns_test_super+0x50/0x50 [ 286.990976] sget+0x102/0x140 [ 286.994068] mount_bdev+0xf8/0x3b0 [ 286.997596] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 287.002874] erofs_mount+0x8c/0xc0 [ 287.006406] ? erofs_kill_sb+0x20/0x20 [ 287.010296] ? alloc_pages_current+0x19b/0x2a0 [ 287.014877] ? __lockdep_init_map+0x100/0x5a0 [ 287.019364] mount_fs+0xa3/0x310 [ 287.022722] vfs_kern_mount.part.0+0x68/0x470 [ 287.027206] do_mount+0x113c/0x2f10 [ 287.030822] ? cmp_ex_sort+0xc0/0xc0 [ 287.034524] ? __do_page_fault+0x180/0xd60 [ 287.038747] ? copy_mount_string+0x40/0x40 [ 287.042978] ? memset+0x20/0x40 [ 287.046243] ? copy_mount_options+0x26f/0x380 [ 287.050731] ksys_mount+0xcf/0x130 [ 287.054261] __x64_sys_mount+0xba/0x150 [ 287.058224] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 287.062793] do_syscall_64+0xf9/0x620 [ 287.066693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.071869] RIP: 0033:0x46702a [ 287.075074] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.094131] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 287.101946] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 287.109207] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 287.116461] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 287.123718] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 287.130973] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 287.143772] erofs: options -> acl,noacl, [ 287.162536] erofs: blksize 1 isn't supported on this platform [ 287.175753] erofs: options -> 05:49:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d370000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 287.193463] erofs: root inode @ nid 36 [ 287.204962] erofs: mounted on /dev/loop2 with opts: . [ 287.218956] erofs: unmounted for /dev/loop3 [ 287.234373] erofs: unmounted for /dev/loop0 05:49:39 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 287.412622] erofs: read_super, device -> /dev/loop5 [ 287.420454] erofs: options -> acl,noacl, [ 287.426529] erofs: read_super, device -> /dev/loop4 [ 287.431073] erofs: root inode @ nid 36 [ 287.435852] erofs: mounted on /dev/loop5 with opts: acl. [ 287.441135] erofs: options -> 05:49:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x16040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 287.477005] erofs: blksize 1 isn't supported on this platform [ 287.485825] erofs: unmounted for /dev/loop2 [ 287.511871] erofs: unmounted for /dev/loop5 [ 287.524890] erofs: read_super, device -> /dev/loop0 [ 287.533007] erofs: read_super, device -> /dev/loop3 [ 287.552251] erofs: options -> [ 287.560455] erofs: options -> acl,noacl, [ 287.560671] erofs: root inode @ nid 36 [ 287.570858] erofs: mounted on /dev/loop0 with opts: . 05:49:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xe04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 287.621515] erofs: read_super, device -> /dev/loop2 [ 287.626942] erofs: options -> [ 287.632082] erofs: read_super, device -> /dev/loop5 [ 287.643202] erofs: options -> acl,noacl, [ 287.649961] erofs: root inode @ nid 36 [ 287.657416] erofs: mounted on /dev/loop2 with opts: . [ 287.668927] erofs: root inode @ nid 36 [ 287.679780] erofs: mounted on /dev/loop5 with opts: acl. [ 287.692137] FAULT_INJECTION: forcing a failure. [ 287.692137] name failslab, interval 1, probability 0, space 0, times 0 [ 287.773363] CPU: 0 PID: 18567 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 287.781288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.790655] Call Trace: [ 287.793259] dump_stack+0x1fc/0x2ef [ 287.796901] should_fail.cold+0xa/0xf [ 287.800717] ? setup_fault_attr+0x200/0x200 [ 287.805052] ? lock_acquire+0x170/0x3c0 [ 287.809051] __should_failslab+0x115/0x180 [ 287.813302] should_failslab+0x5/0x10 [ 287.817114] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 287.822234] __kmalloc_node+0x38/0x70 [ 287.826051] kvmalloc_node+0x61/0xf0 [ 287.829781] __list_lru_init+0x4c6/0x7f0 [ 287.833853] ? up_read+0xa3/0x110 [ 287.837325] sget_userns+0x7e2/0xcd0 [ 287.838392] erofs: read_super, device -> /dev/loop4 [ 287.841044] ? set_bdev_super+0x110/0x110 [ 287.841062] ? ns_test_super+0x50/0x50 [ 287.841077] ? set_bdev_super+0x110/0x110 [ 287.841089] ? ns_test_super+0x50/0x50 [ 287.841102] sget+0x102/0x140 [ 287.841118] mount_bdev+0xf8/0x3b0 [ 287.868801] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 287.874132] erofs_mount+0x8c/0xc0 [ 287.877948] ? erofs_kill_sb+0x20/0x20 [ 287.881856] ? alloc_pages_current+0x19b/0x2a0 [ 287.886449] ? __lockdep_init_map+0x100/0x5a0 [ 287.890954] mount_fs+0xa3/0x310 [ 287.894338] vfs_kern_mount.part.0+0x68/0x470 [ 287.898848] do_mount+0x113c/0x2f10 [ 287.902487] ? cmp_ex_sort+0xc0/0xc0 [ 287.906110] erofs: options -> [ 287.906218] ? __do_page_fault+0x180/0xd60 [ 287.913631] ? copy_mount_string+0x40/0x40 [ 287.917889] ? memset+0x20/0x40 [ 287.921184] ? copy_mount_options+0x26f/0x380 [ 287.925701] ksys_mount+0xcf/0x130 [ 287.929259] __x64_sys_mount+0xba/0x150 [ 287.933248] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 287.937840] do_syscall_64+0xf9/0x620 [ 287.941657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.944960] erofs: blksize 1 isn't supported on this platform [ 287.946852] RIP: 0033:0x46702a 05:49:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d440000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x17040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 287.946868] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.946874] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 287.982547] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 287.989831] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 287.997229] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 288.004510] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 288.011794] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 288.019243] erofs: unmounted for /dev/loop0 05:49:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf04, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 288.044431] erofs: unmounted for /dev/loop5 [ 288.056299] erofs: unmounted for /dev/loop3 [ 288.060851] erofs: unmounted for /dev/loop2 05:49:40 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 288.286199] erofs: read_super, device -> /dev/loop0 [ 288.297388] erofs: options -> [ 288.313066] erofs: root inode @ nid 36 05:49:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 288.342369] erofs: read_super, device -> /dev/loop4 [ 288.347962] erofs: mounted on /dev/loop0 with opts: . [ 288.353925] erofs: options -> [ 288.362843] erofs: blksize 1 isn't supported on this platform [ 288.403809] erofs: unmounted for /dev/loop0 [ 288.425244] erofs: read_super, device -> /dev/loop2 [ 288.430296] erofs: options -> [ 288.434974] erofs: root inode @ nid 36 [ 288.440873] erofs: mounted on /dev/loop2 with opts: . [ 288.462548] erofs: read_super, device -> /dev/loop5 [ 288.464673] FAULT_INJECTION: forcing a failure. [ 288.464673] name failslab, interval 1, probability 0, space 0, times 0 [ 288.471665] erofs: read_super, device -> /dev/loop3 [ 288.479187] CPU: 0 PID: 18614 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 288.491739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.501103] Call Trace: [ 288.503714] dump_stack+0x1fc/0x2ef [ 288.505152] erofs: options -> acl,noacl, [ 288.507352] should_fail.cold+0xa/0xf [ 288.507371] ? setup_fault_attr+0x200/0x200 [ 288.507388] ? lock_acquire+0x170/0x3c0 [ 288.507410] __should_failslab+0x115/0x180 [ 288.507429] should_failslab+0x5/0x10 [ 288.531646] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 288.536782] __kmalloc_node+0x38/0x70 [ 288.537273] erofs: options -> acl,noacl, [ 288.540599] kvmalloc_node+0x61/0xf0 [ 288.540619] __list_lru_init+0x4c6/0x7f0 [ 288.540636] ? up_read+0xa3/0x110 [ 288.540661] sget_userns+0x810/0xcd0 [ 288.540678] ? set_bdev_super+0x110/0x110 [ 288.563767] ? ns_test_super+0x50/0x50 [ 288.567649] ? set_bdev_super+0x110/0x110 [ 288.571794] ? ns_test_super+0x50/0x50 [ 288.575685] sget+0x102/0x140 [ 288.578805] mount_bdev+0xf8/0x3b0 [ 288.581190] erofs: root inode @ nid 36 [ 288.582353] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 288.591509] erofs_mount+0x8c/0xc0 [ 288.595063] ? erofs_kill_sb+0x20/0x20 [ 288.597373] erofs: mounted on /dev/loop5 with opts: acl. [ 288.598963] ? alloc_pages_current+0x19b/0x2a0 [ 288.598980] ? __lockdep_init_map+0x100/0x5a0 [ 288.598997] mount_fs+0xa3/0x310 [ 288.599016] vfs_kern_mount.part.0+0x68/0x470 [ 288.599033] do_mount+0x113c/0x2f10 [ 288.625001] ? cmp_ex_sort+0xc0/0xc0 [ 288.632040] ? __do_page_fault+0x180/0xd60 [ 288.636293] ? copy_mount_string+0x40/0x40 [ 288.640549] ? memset+0x20/0x40 [ 288.643845] ? copy_mount_options+0x26f/0x380 [ 288.648343] ksys_mount+0xcf/0x130 [ 288.651891] __x64_sys_mount+0xba/0x150 [ 288.655879] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 288.660475] do_syscall_64+0xf9/0x620 [ 288.664287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.669484] RIP: 0033:0x46702a 05:49:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x18040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 288.672683] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 288.677705] erofs: read_super, device -> /dev/loop4 [ 288.691594] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 288.691609] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 288.691615] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 288.691624] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 05:49:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56deb0000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 288.691632] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 288.691641] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 288.713464] erofs: unmounted for /dev/loop2 [ 288.733348] erofs: options -> [ 288.742038] erofs: unmounted for /dev/loop3 [ 288.751741] erofs: blksize 1 isn't supported on this platform 05:49:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 288.813228] erofs: unmounted for /dev/loop5 [ 288.843148] erofs: read_super, device -> /dev/loop0 [ 288.849581] erofs: options -> [ 288.853332] erofs: root inode @ nid 36 [ 288.859083] erofs: mounted on /dev/loop0 with opts: . 05:49:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1104, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 288.925231] erofs: read_super, device -> /dev/loop3 [ 288.930561] erofs: options -> acl,noacl, 05:49:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d000300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:41 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 289.023628] erofs: unmounted for /dev/loop0 [ 289.030555] erofs: unmounted for /dev/loop3 [ 289.094541] erofs: read_super, device -> /dev/loop5 [ 289.100260] erofs: options -> acl,noacl, [ 289.107823] erofs: read_super, device -> /dev/loop4 [ 289.117736] erofs: read_super, device -> /dev/loop2 [ 289.140821] erofs: options -> [ 289.143907] erofs: options -> [ 289.151080] erofs: root inode @ nid 36 [ 289.155614] erofs: read_super, device -> /dev/loop0 [ 289.160649] erofs: options -> [ 289.160804] erofs: blksize 1 isn't supported on this platform [ 289.170474] erofs: root inode @ nid 36 [ 289.182907] erofs: root inode @ nid 36 [ 289.195778] erofs: mounted on /dev/loop5 with opts: acl. [ 289.212879] erofs: mounted on /dev/loop0 with opts: . [ 289.218375] erofs: mounted on /dev/loop2 with opts: . 05:49:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56db70300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 289.280885] erofs: read_super, device -> /dev/loop1 [ 289.286879] erofs: options -> acl,noacl, [ 289.293145] erofs: read_super, device -> /dev/loop4 [ 289.298413] erofs: read_super, device -> /dev/loop3 [ 289.307511] erofs: options -> acl,noacl, [ 289.325667] erofs: options -> 05:49:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x19040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 289.341649] FAULT_INJECTION: forcing a failure. [ 289.341649] name failslab, interval 1, probability 0, space 0, times 0 [ 289.355842] erofs: unmounted for /dev/loop3 [ 289.361188] erofs: unmounted for /dev/loop0 [ 289.362700] erofs: blksize 1 isn't supported on this platform [ 289.380894] erofs: unmounted for /dev/loop5 [ 289.394390] erofs: unmounted for /dev/loop2 [ 289.398583] CPU: 1 PID: 18666 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 289.406612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.415967] Call Trace: [ 289.418565] dump_stack+0x1fc/0x2ef [ 289.422184] should_fail.cold+0xa/0xf [ 289.425974] ? setup_fault_attr+0x200/0x200 [ 289.430289] ? lock_acquire+0x170/0x3c0 [ 289.434260] __should_failslab+0x115/0x180 [ 289.438487] should_failslab+0x5/0x10 [ 289.442274] kmem_cache_alloc_trace+0x284/0x380 [ 289.446932] erofs_fill_super+0x167/0x12cc [ 289.451158] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 289.456422] ? vsprintf+0x30/0x30 [ 289.459865] ? wait_for_completion_io+0x10/0x10 [ 289.464520] ? set_blocksize+0x163/0x3f0 [ 289.468572] mount_bdev+0x2fc/0x3b0 [ 289.472188] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 289.477455] erofs_mount+0x8c/0xc0 [ 289.480980] ? erofs_kill_sb+0x20/0x20 [ 289.484859] ? alloc_pages_current+0x19b/0x2a0 [ 289.489426] ? __lockdep_init_map+0x100/0x5a0 [ 289.493907] mount_fs+0xa3/0x310 [ 289.497266] vfs_kern_mount.part.0+0x68/0x470 [ 289.501752] do_mount+0x113c/0x2f10 [ 289.505364] ? cmp_ex_sort+0xc0/0xc0 [ 289.509066] ? __do_page_fault+0x180/0xd60 [ 289.513288] ? copy_mount_string+0x40/0x40 [ 289.517536] ? memset+0x20/0x40 [ 289.520824] ? copy_mount_options+0x26f/0x380 [ 289.525327] ksys_mount+0xcf/0x130 [ 289.528861] __x64_sys_mount+0xba/0x150 [ 289.532825] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 289.537395] do_syscall_64+0xf9/0x620 [ 289.541189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.546364] RIP: 0033:0x46702a [ 289.549546] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 289.568647] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 289.576354] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 289.584132] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 289.591381] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 289.598632] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 289.605880] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1204, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 289.812767] erofs: read_super, device -> /dev/loop3 [ 289.812782] erofs: read_super, device -> /dev/loop0 [ 289.817814] erofs: options -> acl,noacl, 05:49:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56dc20300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:42 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 289.857147] erofs: options -> [ 289.866928] erofs: unmounted for /dev/loop3 [ 289.890679] erofs: root inode @ nid 36 [ 289.898987] erofs: mounted on /dev/loop0 with opts: . [ 289.932084] erofs: read_super, device -> /dev/loop4 [ 289.937173] erofs: options -> [ 289.942108] erofs: read_super, device -> /dev/loop2 [ 289.942157] erofs: read_super, device -> /dev/loop3 [ 289.947135] erofs: options -> [ 289.955854] erofs: options -> acl,noacl, [ 289.957938] erofs: root inode @ nid 36 [ 289.964788] erofs: read_super, device -> /dev/loop5 [ 289.967165] erofs: read_super, device -> /dev/loop1 [ 289.973542] erofs: options -> acl,noacl, [ 289.978412] erofs: blksize 1 isn't supported on this platform [ 289.996318] erofs: root inode @ nid 36 05:49:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d000500000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 290.028945] erofs: mounted on /dev/loop2 with opts: . [ 290.043734] erofs: options -> acl,noacl, [ 290.057816] erofs: mounted on /dev/loop5 with opts: acl. [ 290.064572] erofs: unmounted for /dev/loop0 05:49:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1304, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 290.090283] erofs: unmounted for /dev/loop3 [ 290.097438] FAULT_INJECTION: forcing a failure. [ 290.097438] name failslab, interval 1, probability 0, space 0, times 0 [ 290.127015] CPU: 1 PID: 18707 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 290.134927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.144276] Call Trace: [ 290.146875] dump_stack+0x1fc/0x2ef [ 290.150500] should_fail.cold+0xa/0xf [ 290.154430] ? setup_fault_attr+0x200/0x200 [ 290.158764] ? lock_acquire+0x170/0x3c0 [ 290.162739] __should_failslab+0x115/0x180 [ 290.166966] should_failslab+0x5/0x10 [ 290.170768] kmem_cache_alloc+0x277/0x370 [ 290.174912] ? destroy_inode+0x20/0x20 [ 290.178792] alloc_inode+0x18/0x50 [ 290.182322] ? destroy_inode+0x20/0x20 [ 290.186207] alloc_inode+0x5d/0x180 05:49:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 290.189833] new_inode+0x1d/0xf0 [ 290.193206] erofs_fill_super+0xde9/0x12cc [ 290.197455] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 290.202731] ? vsprintf+0x30/0x30 [ 290.206177] ? wait_for_completion_io+0x10/0x10 [ 290.210832] ? set_blocksize+0x163/0x3f0 [ 290.214898] mount_bdev+0x2fc/0x3b0 [ 290.218519] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 290.223800] erofs_mount+0x8c/0xc0 [ 290.227343] ? erofs_kill_sb+0x20/0x20 [ 290.231237] ? alloc_pages_current+0x19b/0x2a0 [ 290.235823] ? __lockdep_init_map+0x100/0x5a0 [ 290.240320] mount_fs+0xa3/0x310 [ 290.243684] vfs_kern_mount.part.0+0x68/0x470 [ 290.248179] do_mount+0x113c/0x2f10 [ 290.251800] ? cmp_ex_sort+0xc0/0xc0 [ 290.255511] ? __do_page_fault+0x180/0xd60 [ 290.259732] ? copy_mount_string+0x40/0x40 [ 290.263970] ? memset+0x20/0x40 [ 290.267245] ? copy_mount_options+0x26f/0x380 [ 290.271734] ksys_mount+0xcf/0x130 [ 290.275261] __x64_sys_mount+0xba/0x150 [ 290.279223] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 290.283792] do_syscall_64+0xf9/0x620 [ 290.287583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.292755] RIP: 0033:0x46702a [ 290.295942] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 290.314917] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 290.322644] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 290.329901] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 290.337165] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 290.344435] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 290.351712] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 290.382486] erofs: unmounted for /dev/loop5 [ 290.462960] erofs: read_super, device -> /dev/loop0 [ 290.474697] erofs: options -> [ 290.485303] erofs: read_super, device -> /dev/loop4 [ 290.490352] erofs: options -> [ 290.498905] erofs: root inode @ nid 36 05:49:42 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1a040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 290.519715] erofs: mounted on /dev/loop0 with opts: . [ 290.525696] erofs: blksize 1 isn't supported on this platform [ 290.553088] erofs: unmounted for /dev/loop2 [ 290.641666] erofs: read_super, device -> /dev/loop5 [ 290.649812] erofs: options -> acl,noacl, [ 290.655009] erofs: read_super, device -> /dev/loop3 [ 290.662564] erofs: read_super, device -> /dev/loop1 [ 290.671723] erofs: read_super, device -> /dev/loop2 [ 290.672323] erofs: read_super, device -> /dev/loop4 [ 290.684474] erofs: options -> [ 290.685305] erofs: options -> acl,noacl, 05:49:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 290.688130] erofs: root inode @ nid 36 [ 290.699318] erofs: options -> acl,noacl, [ 290.701936] erofs: mounted on /dev/loop2 with opts: . [ 290.710746] FAULT_INJECTION: forcing a failure. [ 290.710746] name failslab, interval 1, probability 0, space 0, times 0 [ 290.722196] erofs: root inode @ nid 36 [ 290.728446] erofs: options -> [ 290.731836] erofs: mounted on /dev/loop5 with opts: acl. [ 290.733019] erofs: unmounted for /dev/loop0 05:49:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d003400000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 290.771847] erofs: blksize 1 isn't supported on this platform 05:49:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1b040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 290.823112] erofs: unmounted for /dev/loop3 [ 290.832927] erofs: unmounted for /dev/loop2 [ 290.837598] erofs: unmounted for /dev/loop5 [ 290.857416] CPU: 0 PID: 18737 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 05:49:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1404, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 290.865336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.874696] Call Trace: [ 290.877427] dump_stack+0x1fc/0x2ef [ 290.881042] should_fail.cold+0xa/0xf [ 290.884834] ? setup_fault_attr+0x200/0x200 [ 290.889142] ? lock_acquire+0x170/0x3c0 [ 290.893108] __should_failslab+0x115/0x180 [ 290.897332] should_failslab+0x5/0x10 [ 290.901117] kmem_cache_alloc_trace+0x284/0x380 [ 290.905776] erofs_fill_super+0x167/0x12cc [ 290.910010] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 290.915285] ? vsprintf+0x30/0x30 [ 290.918731] ? wait_for_completion_io+0x10/0x10 [ 290.923390] ? set_blocksize+0x163/0x3f0 [ 290.927455] mount_bdev+0x2fc/0x3b0 [ 290.931116] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 290.936457] erofs_mount+0x8c/0xc0 [ 290.939985] ? erofs_kill_sb+0x20/0x20 [ 290.943872] ? alloc_pages_current+0x19b/0x2a0 [ 290.948586] ? __lockdep_init_map+0x100/0x5a0 [ 290.953067] mount_fs+0xa3/0x310 [ 290.956421] vfs_kern_mount.part.0+0x68/0x470 [ 290.960921] do_mount+0x113c/0x2f10 [ 290.964539] ? cmp_ex_sort+0xc0/0xc0 [ 290.968252] ? __do_page_fault+0x180/0xd60 [ 290.972488] ? copy_mount_string+0x40/0x40 [ 290.976721] ? memset+0x20/0x40 [ 290.980041] ? copy_mount_options+0x26f/0x380 [ 290.984524] ksys_mount+0xcf/0x130 [ 290.988057] __x64_sys_mount+0xba/0x150 [ 290.992020] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 290.996589] do_syscall_64+0xf9/0x620 [ 291.000392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.005576] RIP: 0033:0x46702a [ 291.008773] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.027680] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 291.035385] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 291.042715] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 291.049970] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 291.057292] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 291.064558] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:43 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 291.275602] erofs: read_super, device -> /dev/loop0 [ 291.280673] erofs: options -> [ 291.287194] erofs: root inode @ nid 36 [ 291.291311] erofs: mounted on /dev/loop0 with opts: . [ 291.328398] erofs: read_super, device -> /dev/loop2 [ 291.333814] erofs: read_super, device -> /dev/loop3 [ 291.338838] erofs: options -> acl,noacl, [ 291.356029] erofs: read_super, device -> /dev/loop4 [ 291.361218] erofs: options -> [ 291.369102] erofs: options -> [ 291.370772] erofs: read_super, device -> /dev/loop5 [ 291.373632] erofs: root inode @ nid 36 [ 291.380024] erofs: options -> acl,noacl, [ 291.390167] erofs: blksize 1 isn't supported on this platform [ 291.406991] erofs: mounted on /dev/loop2 with opts: . [ 291.423981] erofs: root inode @ nid 36 05:49:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d009d00000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 291.444057] erofs: read_super, device -> /dev/loop1 [ 291.449317] erofs: unmounted for /dev/loop0 [ 291.453740] erofs: mounted on /dev/loop5 with opts: acl. [ 291.461596] erofs: unmounted for /dev/loop3 [ 291.471213] erofs: options -> acl,noacl, [ 291.475709] FAULT_INJECTION: forcing a failure. [ 291.475709] name failslab, interval 1, probability 0, space 0, times 0 [ 291.487774] CPU: 0 PID: 18783 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 291.495677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.505040] Call Trace: [ 291.507646] dump_stack+0x1fc/0x2ef [ 291.511290] should_fail.cold+0xa/0xf [ 291.515092] ? do_mount+0x113c/0x2f10 [ 291.518889] ? setup_fault_attr+0x200/0x200 [ 291.523209] ? blk_queue_enter+0x40b/0xb70 [ 291.527462] __should_failslab+0x115/0x180 [ 291.531697] should_failslab+0x5/0x10 [ 291.535527] kmem_cache_alloc_node+0x54/0x3b0 [ 291.540037] create_task_io_context+0x2c/0x430 [ 291.544636] generic_make_request_checks+0x1c4f/0x22e0 [ 291.549933] ? should_fail_bio.isra.0+0xa0/0xa0 [ 291.554618] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 291.559636] ? kmem_cache_alloc+0x315/0x370 [ 291.563964] generic_make_request+0x23f/0xdf0 [ 291.568496] ? blk_put_request+0x110/0x110 [ 291.572755] ? lock_downgrade+0x720/0x720 [ 291.576918] submit_bio+0xb1/0x430 [ 291.580456] ? generic_make_request+0xdf0/0xdf0 [ 291.585118] ? check_preemption_disabled+0x41/0x280 [ 291.590134] ? guard_bio_eod+0x2a0/0x650 [ 291.594199] submit_bh_wbc+0x5a7/0x760 [ 291.598087] __bread_gfp+0x14e/0x300 [ 291.601790] erofs_fill_super+0x207/0x12cc [ 291.606015] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 291.611300] ? vsprintf+0x30/0x30 [ 291.614768] ? wait_for_completion_io+0x10/0x10 [ 291.619439] ? set_blocksize+0x163/0x3f0 [ 291.623506] mount_bdev+0x2fc/0x3b0 [ 291.627131] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 291.632395] erofs_mount+0x8c/0xc0 [ 291.635934] ? erofs_kill_sb+0x20/0x20 [ 291.639830] ? alloc_pages_current+0x19b/0x2a0 05:49:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1c040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 291.644410] ? __lockdep_init_map+0x100/0x5a0 [ 291.648893] mount_fs+0xa3/0x310 [ 291.652259] vfs_kern_mount.part.0+0x68/0x470 [ 291.656776] do_mount+0x113c/0x2f10 [ 291.660410] ? cmp_ex_sort+0xc0/0xc0 [ 291.664135] ? __do_page_fault+0x180/0xd60 [ 291.668380] ? copy_mount_string+0x40/0x40 [ 291.672632] ? memset+0x20/0x40 [ 291.675915] ? copy_mount_options+0x26f/0x380 [ 291.680485] ksys_mount+0xcf/0x130 [ 291.684031] __x64_sys_mount+0xba/0x150 [ 291.688014] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 291.692604] do_syscall_64+0xf9/0x620 [ 291.696403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.701577] RIP: 0033:0x46702a [ 291.704768] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 291.723676] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 291.731391] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a 05:49:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1504, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 291.738655] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 291.745925] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 291.753204] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 291.760467] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 291.772341] erofs: unmounted for /dev/loop2 [ 291.873150] erofs: read_super, device -> /dev/loop0 05:49:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:44 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 291.894020] erofs: options -> [ 291.911094] erofs: root inode @ nid 36 [ 291.916386] erofs: unmounted for /dev/loop5 [ 291.920853] erofs: unmounted for /dev/loop1 [ 291.941694] erofs: mounted on /dev/loop0 with opts: . [ 292.001421] erofs: read_super, device -> /dev/loop2 [ 292.006739] erofs: options -> [ 292.010939] erofs: root inode @ nid 36 [ 292.015195] erofs: read_super, device -> /dev/loop3 [ 292.017132] erofs: read_super, device -> /dev/loop4 [ 292.020249] erofs: options -> acl,noacl, 05:49:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1d040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d00a200000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 292.052554] erofs: mounted on /dev/loop2 with opts: . [ 292.069913] erofs: unmounted for /dev/loop0 [ 292.084852] erofs: options -> [ 292.089947] erofs: unmounted for /dev/loop2 [ 292.096777] erofs: unmounted for /dev/loop3 [ 292.101818] erofs: blksize 1 isn't supported on this platform [ 292.116789] erofs: read_super, device -> /dev/loop1 [ 292.121841] erofs: options -> acl,noacl, [ 292.127168] FAULT_INJECTION: forcing a failure. [ 292.127168] name failslab, interval 1, probability 0, space 0, times 0 [ 292.139470] CPU: 1 PID: 18814 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 292.147360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.156696] Call Trace: [ 292.159339] dump_stack+0x1fc/0x2ef [ 292.162956] should_fail.cold+0xa/0xf [ 292.166748] ? setup_fault_attr+0x200/0x200 [ 292.171055] ? static_obj+0x50/0x50 [ 292.174670] __should_failslab+0x115/0x180 [ 292.178889] should_failslab+0x5/0x10 [ 292.182685] kmem_cache_alloc+0x3f/0x370 [ 292.186738] ? mempool_alloc+0x350/0x350 [ 292.190783] mempool_alloc+0x146/0x350 [ 292.194653] ? mempool_resize+0x790/0x790 [ 292.198784] ? find_get_entry+0x4f4/0x8a0 [ 292.202918] bio_alloc_bioset+0x389/0x5e0 [ 292.207109] ? mark_page_accessed+0x581/0xda0 [ 292.211588] ? bvec_alloc+0x2f0/0x2f0 [ 292.215372] ? pagecache_get_page+0x1c4/0xd50 [ 292.219851] erofs_get_meta_page+0x2bb/0xcd0 [ 292.224244] erofs_iget+0x23b/0x2210 [ 292.227942] ? do_raw_spin_unlock+0x171/0x230 [ 292.232424] erofs_fill_super+0xf65/0x12cc [ 292.236646] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 292.241911] ? vsprintf+0x30/0x30 [ 292.245356] ? wait_for_completion_io+0x10/0x10 [ 292.250006] ? set_blocksize+0x163/0x3f0 [ 292.254057] mount_bdev+0x2fc/0x3b0 [ 292.257675] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 292.262937] erofs_mount+0x8c/0xc0 [ 292.266460] ? erofs_kill_sb+0x20/0x20 [ 292.270332] ? alloc_pages_current+0x19b/0x2a0 [ 292.274902] ? __lockdep_init_map+0x100/0x5a0 [ 292.279391] mount_fs+0xa3/0x310 [ 292.282741] vfs_kern_mount.part.0+0x68/0x470 [ 292.287225] do_mount+0x113c/0x2f10 [ 292.290855] ? cmp_ex_sort+0xc0/0xc0 [ 292.294555] ? __do_page_fault+0x180/0xd60 [ 292.298776] ? copy_mount_string+0x40/0x40 [ 292.302998] ? memset+0x20/0x40 [ 292.306278] ? copy_mount_options+0x26f/0x380 [ 292.310777] ksys_mount+0xcf/0x130 [ 292.314304] __x64_sys_mount+0xba/0x150 [ 292.318266] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 292.322832] do_syscall_64+0xf9/0x620 [ 292.326625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.331806] RIP: 0033:0x46702a [ 292.334982] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.353868] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 292.361559] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 292.368822] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 292.376082] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 292.383344] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 292.390598] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 292.470572] erofs: read_super, device -> /dev/loop5 [ 292.486382] erofs: options -> acl,noacl, [ 292.503104] erofs: read_super, device -> /dev/loop4 [ 292.516738] erofs: options -> 05:49:44 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 292.523875] erofs: root inode @ nid 36 [ 292.541217] erofs: blksize 1 isn't supported on this platform [ 292.554740] erofs: mounted on /dev/loop5 with opts: acl. [ 292.560453] erofs: unmounted for /dev/loop1 [ 292.594220] erofs: read_super, device -> /dev/loop3 [ 292.600073] erofs: options -> acl,noacl, [ 292.614449] erofs: read_super, device -> /dev/loop0 [ 292.627953] erofs: options -> 05:49:44 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 292.641814] erofs: root inode @ nid 36 [ 292.650468] erofs: mounted on /dev/loop0 with opts: . [ 292.718307] erofs: read_super, device -> /dev/loop2 [ 292.728077] erofs: read_super, device -> /dev/loop1 [ 292.742080] erofs: options -> [ 292.753046] erofs: options -> acl,noacl, [ 292.760276] FAULT_INJECTION: forcing a failure. 05:49:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) 05:49:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 292.760276] name failslab, interval 1, probability 0, space 0, times 0 [ 292.778781] erofs: unmounted for /dev/loop5 [ 292.784263] erofs: root inode @ nid 36 [ 292.798289] erofs: unmounted for /dev/loop0 [ 292.802878] CPU: 0 PID: 18843 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 292.810383] erofs: mounted on /dev/loop2 with opts: . [ 292.810771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.810776] Call Trace: [ 292.810806] dump_stack+0x1fc/0x2ef [ 292.831509] should_fail.cold+0xa/0xf [ 292.835316] ? setup_fault_attr+0x200/0x200 [ 292.839721] ? static_obj+0x50/0x50 [ 292.843338] __should_failslab+0x115/0x180 [ 292.847558] should_failslab+0x5/0x10 [ 292.851342] kmem_cache_alloc+0x3f/0x370 [ 292.855389] ? mempool_alloc+0x350/0x350 [ 292.859434] mempool_alloc+0x146/0x350 [ 292.863311] ? mempool_resize+0x790/0x790 [ 292.867444] ? find_get_entry+0x4f4/0x8a0 [ 292.871580] bio_alloc_bioset+0x389/0x5e0 [ 292.875716] ? mark_page_accessed+0x581/0xda0 [ 292.880194] ? bvec_alloc+0x2f0/0x2f0 [ 292.883977] ? pagecache_get_page+0x1c4/0xd50 [ 292.888460] erofs_get_meta_page+0x2bb/0xcd0 [ 292.892854] erofs_iget+0x23b/0x2210 [ 292.896551] ? do_raw_spin_unlock+0x171/0x230 [ 292.901034] erofs_fill_super+0xf65/0x12cc [ 292.905255] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 292.910514] ? vsprintf+0x30/0x30 [ 292.913967] ? wait_for_completion_io+0x10/0x10 [ 292.918628] ? set_blocksize+0x163/0x3f0 [ 292.922675] mount_bdev+0x2fc/0x3b0 [ 292.926292] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 292.931551] erofs_mount+0x8c/0xc0 [ 292.935075] ? erofs_kill_sb+0x20/0x20 [ 292.938950] ? alloc_pages_current+0x19b/0x2a0 [ 292.943577] ? __lockdep_init_map+0x100/0x5a0 [ 292.948058] mount_fs+0xa3/0x310 [ 292.951411] vfs_kern_mount.part.0+0x68/0x470 [ 292.955912] do_mount+0x113c/0x2f10 [ 292.959538] ? cmp_ex_sort+0xc0/0xc0 [ 292.963239] ? __do_page_fault+0x180/0xd60 [ 292.967460] ? copy_mount_string+0x40/0x40 [ 292.971694] ? memset+0x20/0x40 [ 292.974958] ? copy_mount_options+0x26f/0x380 [ 292.979438] ksys_mount+0xcf/0x130 [ 292.982965] __x64_sys_mount+0xba/0x150 [ 292.986930] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 292.991515] do_syscall_64+0xf9/0x620 [ 292.995310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.000481] RIP: 0033:0x46702a 05:49:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56dd95ce0720c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 293.003658] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 293.022554] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 293.030255] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 293.037512] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 293.044764] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 293.052016] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 293.059271] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 293.076160] erofs: unmounted for /dev/loop3 [ 293.170783] erofs: read_super, device -> /dev/loop4 [ 293.190198] erofs: read_super, device -> /dev/loop5 [ 293.204734] erofs: options -> 05:49:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1e040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 293.227624] erofs: blksize 1 isn't supported on this platform [ 293.241900] erofs: options -> acl,noacl, [ 293.254185] erofs: unmounted for /dev/loop2 05:49:45 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 293.279600] erofs: root inode @ nid 36 [ 293.285472] erofs: unmounted for /dev/loop1 [ 293.303136] erofs: mounted on /dev/loop5 with opts: acl. 05:49:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56ddf5ce0720c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8002, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 293.395955] erofs: read_super, device -> /dev/loop2 [ 293.396101] erofs: read_super, device -> /dev/loop3 [ 293.401004] erofs: options -> [ 293.401555] erofs: read_super, device -> /dev/loop4 [ 293.410956] erofs: options -> acl,noacl, [ 293.421729] erofs: read_super, device -> /dev/loop0 [ 293.429893] erofs: root inode @ nid 36 [ 293.440553] erofs: unmounted for /dev/loop3 05:49:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@acl='acl'}, {@noacl='noacl'}]}) [ 293.441807] erofs: read_super, device -> /dev/loop1 [ 293.454142] erofs: options -> [ 293.462357] erofs: options -> acl,noacl, [ 293.464102] erofs: root inode @ nid 36 [ 293.466936] erofs: mounted on /dev/loop2 with opts: . [ 293.473373] erofs: unmounted for /dev/loop5 [ 293.480382] erofs: options -> [ 293.483798] FAULT_INJECTION: forcing a failure. [ 293.483798] name failslab, interval 1, probability 0, space 0, times 0 [ 293.500160] erofs: blksize 1 isn't supported on this platform [ 293.531030] erofs: mounted on /dev/loop0 with opts: . [ 293.541993] CPU: 1 PID: 18871 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 293.549904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.559243] Call Trace: [ 293.561823] dump_stack+0x1fc/0x2ef [ 293.565440] should_fail.cold+0xa/0xf [ 293.569228] ? setup_fault_attr+0x200/0x200 [ 293.573547] ? lock_acquire+0x170/0x3c0 [ 293.577522] __should_failslab+0x115/0x180 [ 293.581745] should_failslab+0x5/0x10 [ 293.585530] kmem_cache_alloc+0x277/0x370 [ 293.589668] __d_alloc+0x2b/0xa10 [ 293.593110] d_make_root+0x3e/0x90 [ 293.596642] erofs_fill_super+0x102f/0x12cc [ 293.600953] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 293.606215] ? vsprintf+0x30/0x30 [ 293.609660] ? wait_for_completion_io+0x10/0x10 [ 293.614315] ? set_blocksize+0x163/0x3f0 [ 293.618363] mount_bdev+0x2fc/0x3b0 [ 293.621976] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 293.627240] erofs_mount+0x8c/0xc0 [ 293.630766] ? erofs_kill_sb+0x20/0x20 [ 293.634646] ? alloc_pages_current+0x19b/0x2a0 [ 293.639213] ? __lockdep_init_map+0x100/0x5a0 [ 293.643692] mount_fs+0xa3/0x310 [ 293.647046] vfs_kern_mount.part.0+0x68/0x470 [ 293.651540] do_mount+0x113c/0x2f10 [ 293.655202] ? cmp_ex_sort+0xc0/0xc0 [ 293.658902] ? __do_page_fault+0x180/0xd60 [ 293.663123] ? copy_mount_string+0x40/0x40 [ 293.667350] ? memset+0x20/0x40 [ 293.670616] ? copy_mount_options+0x26f/0x380 [ 293.675104] ksys_mount+0xcf/0x130 [ 293.678629] __x64_sys_mount+0xba/0x150 [ 293.682590] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 293.687170] do_syscall_64+0xf9/0x620 [ 293.690959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.696126] RIP: 0033:0x46702a [ 293.699299] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 293.718201] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 293.725890] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 293.733137] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 293.740402] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 05:49:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1f040000, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 293.747654] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 293.754905] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 05:49:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff0, 0x3, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0f336c56d010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 05:49:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) [ 293.809863] erofs: unmounted for /dev/loop2 [ 293.839032] erofs: read_super, device -> /dev/loop3 [ 293.848383] erofs: options -> acl,noacl, [ 293.849416] erofs: unmounted for /dev/loop0 [ 293.855879] ------------[ cut here ]------------ [ 293.861585] kernel BUG at fs/inode.c:1571! [ 293.866741] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 293.872125] CPU: 1 PID: 18871 Comm: syz-executor.1 Not tainted 4.19.172-syzkaller #0 [ 293.880050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.889404] RIP: 0010:iput+0x727/0x860 [ 293.893274] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 83 d8 ee ff e9 0a fd ff ff e8 f9 20 b9 ff <0f> 0b e8 f2 20 b9 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 e2 e8 6c [ 293.912154] RSP: 0018:ffff88804eca7a80 EFLAGS: 00010246 [ 293.917498] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90007e2c000 [ 293.924847] RDX: 0000000000040000 RSI: ffffffff81a938c7 RDI: 0000000000000007 [ 293.932099] RBP: ffff88804b35a998 R08: 0000000000000000 R09: 0000000000000000 [ 293.939349] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880983f1a00 [ 293.946596] R13: ffff88804b35a998 R14: 0000000000000000 R15: 00000000fffffff4 [ 293.953846] FS: 00007f027c8ec700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 293.962050] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 293.967970] CR2: 00007f00127fa000 CR3: 00000000aaaaf000 CR4: 00000000001406e0 [ 293.975221] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 293.982595] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 293.989849] Call Trace: [ 293.992492] erofs_fill_super+0x1205/0x12cc [ 293.996800] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 294.002059] ? vsprintf+0x30/0x30 [ 294.005497] ? wait_for_completion_io+0x10/0x10 [ 294.010148] ? set_blocksize+0x163/0x3f0 [ 294.014268] mount_bdev+0x2fc/0x3b0 [ 294.017877] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 294.023135] erofs_mount+0x8c/0xc0 [ 294.026656] ? erofs_kill_sb+0x20/0x20 [ 294.030544] ? alloc_pages_current+0x19b/0x2a0 [ 294.035139] ? __lockdep_init_map+0x100/0x5a0 [ 294.039650] mount_fs+0xa3/0x310 [ 294.043006] vfs_kern_mount.part.0+0x68/0x470 [ 294.047514] do_mount+0x113c/0x2f10 [ 294.051145] ? cmp_ex_sort+0xc0/0xc0 [ 294.054850] ? __do_page_fault+0x180/0xd60 [ 294.059070] ? copy_mount_string+0x40/0x40 [ 294.063291] ? memset+0x20/0x40 [ 294.066556] ? copy_mount_options+0x26f/0x380 [ 294.071035] ksys_mount+0xcf/0x130 [ 294.074637] __x64_sys_mount+0xba/0x150 [ 294.078607] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 294.083250] do_syscall_64+0xf9/0x620 [ 294.087035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.092212] RIP: 0033:0x46702a [ 294.095394] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 294.114275] RSP: 002b:00007f027c8ebfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 294.121967] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 000000000046702a [ 294.129218] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f027c8ec000 [ 294.136577] RBP: 00007f027c8ec040 R08: 00007f027c8ec040 R09: 0000000020000000 [ 294.143826] R10: 0000000000008002 R11: 0000000000000206 R12: 0000000020000000 [ 294.151094] R13: 0000000020000100 R14: 00007f027c8ec000 R15: 0000000020000140 [ 294.158378] Modules linked in: [ 294.173057] ---[ end trace fdf349e42338cb79 ]--- [ 294.178186] RIP: 0010:iput+0x727/0x860 [ 294.182225] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 83 d8 ee ff e9 0a fd ff ff e8 f9 20 b9 ff <0f> 0b e8 f2 20 b9 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 e2 e8 6c [ 294.204550] RSP: 0018:ffff88804eca7a80 EFLAGS: 00010246 [ 294.210402] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90007e2c000 [ 294.224082] RDX: 0000000000040000 RSI: ffffffff81a938c7 RDI: 0000000000000007 [ 294.233121] RBP: ffff88804b35a998 R08: 0000000000000000 R09: 0000000000000000 [ 294.241168] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880983f1a00 [ 294.248826] R13: ffff88804b35a998 R14: 0000000000000000 R15: 00000000fffffff4 [ 294.256647] FS: 00007f027c8ec700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 294.265342] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 294.271608] CR2: 0000000000568000 CR3: 00000000aaaaf000 CR4: 00000000001406e0 [ 294.279292] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 294.287996] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 294.295765] Kernel panic - not syncing: Fatal exception [ 294.301698] Kernel Offset: disabled [ 294.305320] Rebooting in 86400 seconds..